Boletines de Vulnerabilidades |
Múltiples vulnerabilidades en el componente Elf loader de las versiones 2.4 y 2.6 del Kernel |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Compromiso Root |
Dificultad | Avanzado |
Requerimientos del atacante | Acceso remoto con cuenta |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado |
Linux Kernel 2.4.x <= 2.4.27 Linux Kernel 2.6.x <= 2.6.8 |
Descripción |
|
Se han encontrado varias vulnerabilidades en el ELF loader que podrian permitir a un usuario local conseguir privilegios de root. ELF loader es un componente utilizado por el kernel de Linux cuando un programa hace la llamada a sistema "execve()" para cargar ejecutables. A continuación se describen los fallos de seguridad: - No se comprueban correctamente los valores resultantes de las llamadas a la funcion kernel_read (), lo cual podría ser aprovechado por usuarios locales para modificar partes de memoria en un programa setuid y ejecutar código arbitrario. - Existe un manejo incorrecto de las llamadas fallidas a la función mmap(). - Es posible crear una cadena de nombre de intérprete que no acabe en NULL. -Se permite que usuarios locales lean binarios que en principio no tienen derechos de lectura mediante la funcionalidad (PT_INTERP). -En algunos casos, se permite a los usuarios locales generar una denegación de servicio (kernel oops) mendiante un binario a.out creado de forma maliciosa. |
|
Solución |
|
Aplique los mecanismos de actualización propios de su sistema, o bien descargue las fuentes del software y compílelas usted mismo. Actualización de Software Suse Linux Suse Linux 8.1, 8.2, 9.0, 9.1, 9.2, Enterprise Server 8, 9, SUSE LINUX Desktop 1.0, Novell Linux Desktop 9 Descargue los parches mediante YAST o desde el servidor FTP oficial de Suse Linux Fedora Fedora Core 3 http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/SRPMS/kernel-2.6.9-1.681_FC3.src.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/kernel-2.6.9-1.681_FC3.x86_64.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/kernel-smp-2.6.9-1.681_FC3.x86_64.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/debug/kernel-debuginfo-2.6.9-1.681_FC3.x86_64.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/kernel-doc-2.6.9-1.681_FC3.noarch.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-2.6.9-1.681_FC3.i586.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-smp-2.6.9-1.681_FC3.i586.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/debug/kernel-debuginfo-2.6.9-1.681_FC3.i586.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-2.6.9-1.681_FC3.i686.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-smp-2.6.9-1.681_FC3.i686.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/debug/kernel-debuginfo-2.6.9-1.681_FC3.i686.rpm http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-doc-2.6.9-1.681_FC3.noarch.rpm Red Hat Linux Red Hat Enterprise Linux AS version 3 & SRPMS: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Enterprise Linux AS version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Enterprise Linux AS version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Enterprise Linux AS version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Enterprise Linux AS version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Enterprise Linux AS version 3 &ia64: kernel-2.4.21-20.0.1.EL.ia64.rpm kernel-doc-2.4.21-20.0.1.EL.ia64.rpm kernel-source-2.4.21-20.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm Red Hat Enterprise Linux AS version 3 & ppc64: kernel-doc-2.4.21-20.0.1.EL.ppc64.rpm kernel-source-2.4.21-20.0.1.EL.ppc64.rpm Red Hat Enterprise Linux AS version 3 & ppc64iseries: kernel-2.4.21-20.0.1.EL.ppc64iseries.rpm kernel-unsupported-2.4.21-20.0.1.EL.ppc64iseries.rpm Red Hat Enterprise Linux AS version 3 &ppc64pseries: kernel-2.4.21-20.0.1.EL.ppc64pseries.rpm kernel-unsupported-2.4.21-20.0.1.EL.ppc64pseries.rpm Red Hat Enterprise Linux AS version 3 & s390: kernel-2.4.21-20.0.1.EL.s390.rpm kernel-doc-2.4.21-20.0.1.EL.s390.rpm kernel-source-2.4.21-20.0.1.EL.s390.rpm kernel-unsupported-2.4.21-20.0.1.EL.s390.rpm Red Hat Enterprise Linux AS version 3 & s390x: kernel-2.4.21-20.0.1.EL.s390x.rpm kernel-doc-2.4.21-20.0.1.EL.s390x.rpm kernel-source-2.4.21-20.0.1.EL.s390x.rpm kernel-unsupported-2.4.21-20.0.1.EL.s390x.rpm Red Hat Enterprise Linux AS version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Red Hat Desktop version 3 & SRPMS: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Desktop version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Desktop version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Desktop version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Desktop version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Desktop version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3 & SRPM: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Enterprise Linux ES version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Enterprise Linux ES version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Enterprise Linux ES version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Enterprise Linux ES version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Enterprise Linux ES version 3 & ia64: kernel-2.4.21-20.0.1.EL.ia64.rpm kernel-doc-2.4.21-20.0.1.EL.ia64.rpm kernel-source-2.4.21-20.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm Red Hat Enterprise Linux ES version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Red Hat Enterprise Linux WS version 3 & SRPMS: kernel-2.4.21-20.0.1.EL.src.rpm Red Hat Enterprise Linux WS version 3 & athlon: kernel-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-2.4.21-20.0.1.EL.athlon.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm Red Hat Enterprise Linux WS version 3 & i386: kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm kernel-doc-2.4.21-20.0.1.EL.i386.rpm kernel-source-2.4.21-20.0.1.EL.i386.rpm Red Hat Enterprise Linux WS version 3 & i686: kernel-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-smp-2.4.21-20.0.1.EL.i686.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm Red Hat Enterprise Linux WS version 3 & ia32e: kernel-2.4.21-20.0.1.EL.ia32e.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm Red Hat Enterprise Linux WS version 3 & ia64: kernel-2.4.21-20.0.1.EL.ia64.rpm kernel-doc-2.4.21-20.0.1.EL.ia64.rpm kernel-source-2.4.21-20.0.1.EL.ia64.rpm kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm Red Hat Enterprise Linux WS version 3 & x86_64: kernel-2.4.21-20.0.1.EL.x86_64.rpm kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm kernel-source-2.4.21-20.0.1.EL.x86_64.rpm kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm Nuevos parches de Red Hat Linux (RHSA-2004:504-13) Red Hat Enterprise Linux AS (v. 2.1) & SRPMS: kernel-2.4.18-e.52.src.rpm Red Hat Enterprise Linux AS (v. 2.1) & IA-64: kernel-2.4.18-e.52.ia64.rpm kernel-doc-2.4.18-e.52.ia64.rpm kernel-smp-2.4.18-e.52.ia64.rpm kernel-source-2.4.18-e.52.ia64.rpm Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & SRPMS: kernel-2.4.18-e.52.src.rpm Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & IA-64: kernel-2.4.18-e.52.ia64.rpm kernel-doc-2.4.18-e.52.ia64.rpm kernel-smp-2.4.18-e.52.ia64.rpm kernel-source-2.4.18-e.52.ia64.rpm https://rhn.redhat.com/ Nuevos parches de Red Hat Linux (RHSA-2004:505-14) Red Hat Enterprise Linux AS (v. 2.1) & IA-32: kernel-2.4.9-e.57.athlon.rpm kernel-2.4.9-e.57.i686.rpm kernel-BOOT-2.4.9-e.57.i386.rpm kernel-debug-2.4.9-e.57.i686.rpm kernel-doc-2.4.9-e.57.i386.rpm kernel-enterprise-2.4.9-e.57.i686.rpm kernel-headers-2.4.9-e.57.i386.rpm kernel-smp-2.4.9-e.57.athlon.rpm kernel-smp-2.4.9-e.57.i686.rpm kernel-source-2.4.9-e.57.i386.rpm kernel-summit-2.4.9-e.57.i686.rpm Red Hat Enterprise Linux ES (v. 2.1) & SRPMS: kernel-2.4.9-e.57.src.rpm Red Hat Enterprise Linux ES (v. 2.1) & IA-32: kernel-2.4.9-e.57.athlon.rpm kernel-2.4.9-e.57.i686.rpm kernel-BOOT-2.4.9-e.57.i386.rpm kernel-debug-2.4.9-e.57.i686.rpm kernel-doc-2.4.9-e.57.i386.rpm kernel-headers-2.4.9-e.57.i386.rpm kernel-smp-2.4.9-e.57.athlon.rpm kernel-smp-2.4.9-e.57.i686.rpm kernel-source-2.4.9-e.57.i386.rpm Red Hat Enterprise Linux WS (v. 2.1) & SRPMS: kernel-2.4.9-e.57.src.rpm Red Hat Enterprise Linux WS (v. 2.1) & IA-32: kernel-2.4.9-e.57.athlon.rpm kernel-2.4.9-e.57.i686.rpm kernel-BOOT-2.4.9-e.57.i386.rpm kernel-debug-2.4.9-e.57.i686.rpm kernel-doc-2.4.9-e.57.i386.rpm kernel-enterprise-2.4.9-e.57.i686.rpm kernel-headers-2.4.9-e.57.i386.rpm kernel-smp-2.4.9-e.57.athlon.rpm kernel-smp-2.4.9-e.57.i686.rpm kernel-source-2.4.9-e.57.i386.rpm https://rhn.redhat.com/ Mandrake Linux Mandrakelinux 9.2 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-enterprise-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-i686-up-4GB-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-p3-smp-64GB-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-source-2.4.22-41mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-source-2.4.22-41mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm Mandrakelinux 10.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.4.25-13mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.6.3-25mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm Mandrakelinux 10.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i686-up-64GB-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm Mandrake Multi Network Firewall 8.2 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/modutils-2.4.19-5mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/modutils-2.4.19-5mdk.src.rpm Mandrake Corporate Server 2.1 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-enterprise-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm Mandrake Corporate Server 3.0 x86 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm Red Hat Linux Red Hat Desktop (v. 3) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux WS (v. 3) Red Hat Enterprise Linux AS (v. 2.1) Red Hat Enterprise Linux ES (v. 2.1) Red Hat Enterprise Linux WS (v. 2.1) Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor https://rhn.redhat.com/ Red Hat Linux (ia32el) Red Hat Enterprise Linux AS (v. 3) Red Hat Enterprise Linux ES (v. 3) Red Hat Enterprise Linux WS (v. 3) https://rhn.redhat.com/ SGI Advanced Linux Environment 3 / Patch 10290 ftp://patches.sgi.com/support/free/security/patches/ProPack/2.4/ Debian (kernel 2.4.16) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz ARM http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb Debian (kernel 2.4.18) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb Debian (kernel 2.4.19) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb Debian (kernel 2.4.17) Debian Linux 3.0 Source http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz Architecture independent http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb HP Precision http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb Intel IA-64 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb IBM S/390 http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb PowerPC http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb Big endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb Alpha http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb ARM http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb Intel IA-32 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb Motorola 680x0 http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb Sun Sparc http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE |
CAN-2004-1070 CAN-2004-1071 CAN-2004-1072 CAN-2004-1073 CAN-2004-1074 |
BID | |
Recursos adicionales |
|
ISEC security advisory (isec-0017) http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt Linux SuSE security advisory (SUSE-SA:2004:042) http://www.suse.de/de/security/2004_42_kernel.html Linux Fedora security advisory (FEDORA-2004-451) http://www.redhat.com/archives/fedora-announce-list/2004-November/msg00063.html Red Hat Linux Security Advisory (RHSA-2004:549-10) https://rhn.redhat.com/errata/RHSA-2004-549.html Red Hat Linux Security Advisory (RHSA-2004:504-13) https://rhn.redhat.com/errata/RHSA-2004-504.html Red Hat Linux Security Advisory (RHSA-2004:505-14) https://rhn.redhat.com/errata/RHSA-2004-505.html Red Hat Security Advisory RHSA-2005:293-16 https://rhn.redhat.com/errata/RHSA-2005-293.html Red Hat Security Advisory RHSA-2005:275-09 https://rhn.redhat.com/errata/RHSA-2005-275.html Red Hat Security Advisory (RHSA-2006:0190-5) https://rhn.redhat.com/errata/RHSA-2006-0190.html Red Hat Security Advisory (RHSA-2006:0191-9) https://rhn.redhat.com/errata/RHSA-2006-0191.html Mandrakesoft Security Advisories MDKSA-2005:022 http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:022 SGI Security Advisory (20060402-01-U) ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U.asc Debian Security Advisory (DSA 1067-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00152.html Debian Security Advisory (DSA 1069-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00156.html Debian Security Advisory (DSA 1070-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00155.html Debian Security Advisory (DSA 1082-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00168.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2004-12-02 |
1.1 | Aviso emitido por Red Hat Linux (RHSA-2004:549-10) | 2004-12-03 |
1.2 | Nuevos parches emitidos por Red Hat Linux (RHSA-2004:504-13) y (RHSA-2004:505-14) | 2004-12-14 |
1.3 | Aviso emitido por Mandrake (MDKSA-2005:022) | 2005-01-26 |
1.4 | Aviso emitido por Red Hat (RHSA-2005:293-16) | 2005-04-25 |
1.5 | Aviso emitido por Red Hat (RHSA-2005:275-09) | 2005-05-19 |
1.6 | Avisos emitidos por Red Hat (RHSA-2006:0190-5, RHSA-2006:0191-9) | 2006-02-02 |
1.7 | Aviso emitido por SGI (20060402-01-U) | 2006-04-11 |
1.8 | Aviso emitido por Debian (DSA 1067-1, DSA 1069-1, DSA 1070-1) | 2006-05-22 |
1.9 | Aviso emitido por Debian (DSA 1082-1) | 2006-05-31 |