int(1180)

Boletines de Vulnerabilidades


Múltiples vulnerabilidades en el componente Elf loader de las versiones 2.4 y 2.6 del Kernel

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Compromiso Root
Dificultad Avanzado
Requerimientos del atacante Acceso remoto con cuenta

Información sobre el sistema

Propiedad Valor
Fabricante afectado GNU/Linux
Software afectado Linux Kernel 2.4.x <= 2.4.27
Linux Kernel 2.6.x <= 2.6.8

Descripción

Se han encontrado varias vulnerabilidades en el ELF loader que podrian permitir a un usuario local conseguir privilegios de root.
ELF loader es un componente utilizado por el kernel de Linux cuando un programa hace la llamada a sistema "execve()" para cargar ejecutables.
A continuación se describen los fallos de seguridad:

- No se comprueban correctamente los valores resultantes de las llamadas a la funcion kernel_read (), lo cual podría ser aprovechado por usuarios locales para modificar partes de memoria en un programa setuid y ejecutar código arbitrario.

- Existe un manejo incorrecto de las llamadas fallidas a la función mmap().

- Es posible crear una cadena de nombre de intérprete que no acabe en NULL.

-Se permite que usuarios locales lean binarios que en principio no tienen derechos de lectura mediante la funcionalidad (PT_INTERP).

-En algunos casos, se permite a los usuarios locales generar una denegación de servicio (kernel oops) mendiante un binario a.out creado de forma maliciosa.

Solución

Aplique los mecanismos de actualización propios de su sistema, o bien descargue las fuentes del software y compílelas usted mismo.


Actualización de Software

Suse Linux
Suse Linux 8.1, 8.2, 9.0, 9.1, 9.2, Enterprise Server 8, 9, SUSE LINUX Desktop 1.0, Novell Linux Desktop 9
Descargue los parches mediante YAST o desde el servidor FTP oficial de Suse Linux

Fedora
Fedora Core 3
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/SRPMS/kernel-2.6.9-1.681_FC3.src.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/kernel-2.6.9-1.681_FC3.x86_64.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/kernel-smp-2.6.9-1.681_FC3.x86_64.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/debug/kernel-debuginfo-2.6.9-1.681_FC3.x86_64.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/x86_64/kernel-doc-2.6.9-1.681_FC3.noarch.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-2.6.9-1.681_FC3.i586.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-smp-2.6.9-1.681_FC3.i586.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/debug/kernel-debuginfo-2.6.9-1.681_FC3.i586.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-2.6.9-1.681_FC3.i686.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-smp-2.6.9-1.681_FC3.i686.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/debug/kernel-debuginfo-2.6.9-1.681_FC3.i686.rpm
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/i386/kernel-doc-2.6.9-1.681_FC3.noarch.rpm

Red Hat Linux

Red Hat Enterprise Linux AS version 3 & SRPMS:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Enterprise Linux AS version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Enterprise Linux AS version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Enterprise Linux AS version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Enterprise Linux AS version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Enterprise Linux AS version 3 &ia64:
kernel-2.4.21-20.0.1.EL.ia64.rpm
kernel-doc-2.4.21-20.0.1.EL.ia64.rpm
kernel-source-2.4.21-20.0.1.EL.ia64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm

Red Hat Enterprise Linux AS version 3 & ppc64:
kernel-doc-2.4.21-20.0.1.EL.ppc64.rpm
kernel-source-2.4.21-20.0.1.EL.ppc64.rpm

Red Hat Enterprise Linux AS version 3 & ppc64iseries:
kernel-2.4.21-20.0.1.EL.ppc64iseries.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ppc64iseries.rpm

Red Hat Enterprise Linux AS version 3 &ppc64pseries:
kernel-2.4.21-20.0.1.EL.ppc64pseries.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ppc64pseries.rpm

Red Hat Enterprise Linux AS version 3 & s390:
kernel-2.4.21-20.0.1.EL.s390.rpm
kernel-doc-2.4.21-20.0.1.EL.s390.rpm
kernel-source-2.4.21-20.0.1.EL.s390.rpm
kernel-unsupported-2.4.21-20.0.1.EL.s390.rpm

Red Hat Enterprise Linux AS version 3 & s390x:
kernel-2.4.21-20.0.1.EL.s390x.rpm
kernel-doc-2.4.21-20.0.1.EL.s390x.rpm
kernel-source-2.4.21-20.0.1.EL.s390x.rpm
kernel-unsupported-2.4.21-20.0.1.EL.s390x.rpm

Red Hat Enterprise Linux AS version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Red Hat Desktop version 3 & SRPMS:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Desktop version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Desktop version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Desktop version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Desktop version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Desktop version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3 & SRPM:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Enterprise Linux ES version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Enterprise Linux ES version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Enterprise Linux ES version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Enterprise Linux ES version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Enterprise Linux ES version 3 & ia64:
kernel-2.4.21-20.0.1.EL.ia64.rpm
kernel-doc-2.4.21-20.0.1.EL.ia64.rpm
kernel-source-2.4.21-20.0.1.EL.ia64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm

Red Hat Enterprise Linux ES version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3 & SRPMS:
kernel-2.4.21-20.0.1.EL.src.rpm

Red Hat Enterprise Linux WS version 3 & athlon:
kernel-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-2.4.21-20.0.1.EL.athlon.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.athlon.rpm
kernel-unsupported-2.4.21-20.0.1.EL.athlon.rpm

Red Hat Enterprise Linux WS version 3 & i386:
kernel-BOOT-2.4.21-20.0.1.EL.i386.rpm
kernel-doc-2.4.21-20.0.1.EL.i386.rpm
kernel-source-2.4.21-20.0.1.EL.i386.rpm

Red Hat Enterprise Linux WS version 3 & i686:
kernel-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-2.4.21-20.0.1.EL.i686.rpm
kernel-hugemem-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-2.4.21-20.0.1.EL.i686.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.i686.rpm
kernel-unsupported-2.4.21-20.0.1.EL.i686.rpm

Red Hat Enterprise Linux WS version 3 & ia32e:
kernel-2.4.21-20.0.1.EL.ia32e.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia32e.rpm

Red Hat Enterprise Linux WS version 3 & ia64:
kernel-2.4.21-20.0.1.EL.ia64.rpm
kernel-doc-2.4.21-20.0.1.EL.ia64.rpm
kernel-source-2.4.21-20.0.1.EL.ia64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.ia64.rpm

Red Hat Enterprise Linux WS version 3 & x86_64:
kernel-2.4.21-20.0.1.EL.x86_64.rpm
kernel-doc-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-2.4.21-20.0.1.EL.x86_64.rpm
kernel-smp-unsupported-2.4.21-20.0.1.EL.x86_64.rpm
kernel-source-2.4.21-20.0.1.EL.x86_64.rpm
kernel-unsupported-2.4.21-20.0.1.EL.x86_64.rpm

Nuevos parches de Red Hat Linux (RHSA-2004:504-13)

Red Hat Enterprise Linux AS (v. 2.1) & SRPMS:
kernel-2.4.18-e.52.src.rpm

Red Hat Enterprise Linux AS (v. 2.1) & IA-64:
kernel-2.4.18-e.52.ia64.rpm
kernel-doc-2.4.18-e.52.ia64.rpm
kernel-smp-2.4.18-e.52.ia64.rpm
kernel-source-2.4.18-e.52.ia64.rpm

Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & SRPMS:
kernel-2.4.18-e.52.src.rpm

Red Hat Linux Advanced Workstation 2.1 & the Itanium Processor & IA-64:
kernel-2.4.18-e.52.ia64.rpm
kernel-doc-2.4.18-e.52.ia64.rpm
kernel-smp-2.4.18-e.52.ia64.rpm
kernel-source-2.4.18-e.52.ia64.rpm
https://rhn.redhat.com/

Nuevos parches de Red Hat Linux (RHSA-2004:505-14)

Red Hat Enterprise Linux AS (v. 2.1) & IA-32:
kernel-2.4.9-e.57.athlon.rpm
kernel-2.4.9-e.57.i686.rpm
kernel-BOOT-2.4.9-e.57.i386.rpm
kernel-debug-2.4.9-e.57.i686.rpm
kernel-doc-2.4.9-e.57.i386.rpm
kernel-enterprise-2.4.9-e.57.i686.rpm
kernel-headers-2.4.9-e.57.i386.rpm
kernel-smp-2.4.9-e.57.athlon.rpm
kernel-smp-2.4.9-e.57.i686.rpm
kernel-source-2.4.9-e.57.i386.rpm
kernel-summit-2.4.9-e.57.i686.rpm

Red Hat Enterprise Linux ES (v. 2.1) & SRPMS:
kernel-2.4.9-e.57.src.rpm

Red Hat Enterprise Linux ES (v. 2.1) & IA-32:
kernel-2.4.9-e.57.athlon.rpm
kernel-2.4.9-e.57.i686.rpm
kernel-BOOT-2.4.9-e.57.i386.rpm
kernel-debug-2.4.9-e.57.i686.rpm
kernel-doc-2.4.9-e.57.i386.rpm
kernel-headers-2.4.9-e.57.i386.rpm
kernel-smp-2.4.9-e.57.athlon.rpm
kernel-smp-2.4.9-e.57.i686.rpm
kernel-source-2.4.9-e.57.i386.rpm

Red Hat Enterprise Linux WS (v. 2.1) & SRPMS:
kernel-2.4.9-e.57.src.rpm

Red Hat Enterprise Linux WS (v. 2.1) & IA-32:
kernel-2.4.9-e.57.athlon.rpm
kernel-2.4.9-e.57.i686.rpm
kernel-BOOT-2.4.9-e.57.i386.rpm
kernel-debug-2.4.9-e.57.i686.rpm
kernel-doc-2.4.9-e.57.i386.rpm
kernel-enterprise-2.4.9-e.57.i686.rpm
kernel-headers-2.4.9-e.57.i386.rpm
kernel-smp-2.4.9-e.57.athlon.rpm
kernel-smp-2.4.9-e.57.i686.rpm
kernel-source-2.4.9-e.57.i386.rpm
https://rhn.redhat.com/

Mandrake Linux

Mandrakelinux 9.2
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-enterprise-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-i686-up-4GB-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-p3-smp-64GB-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/kernel-source-2.4.22-41mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-2.4.22.41mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-secure-2.4.22.41mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-smp-2.4.22.41mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/kernel-source-2.4.22-41mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/kernel-2.4.22.41mdk-1-1mdk.src.rpm

Mandrakelinux 10.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.4.25-13mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-2.6.3-25mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/kernel-source-stripped-2.6.3-25mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/module-init-tools-3.0-1.2.1.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/module-init-tools-3.0-1.2.1.100mdk.src.rpm

Mandrakelinux 10.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-enterprise-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i586-up-1GB-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-i686-up-64GB-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-2.6.8.1.24mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-secure-2.6.8.1.24mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.4.28.0.rc1.5mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-smp-2.6.8.1.24mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.4-2.4.28-0.rc1.5mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-2.6-2.6.8.1-24mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/kernel-source-stripped-2.6-2.6.8.1-24mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.4.28.0.rc1.5mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/kernel-2.6.8.1.24mdk-1-1mdk.src.rpm

Mandrake Multi Network Firewall 8.2
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/modutils-2.4.19-5mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/modutils-2.4.19-5mdk.src.rpm

Mandrake Corporate Server 2.1
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-enterprise-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-2.4.19.48mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-secure-2.4.19.48mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-smp-2.4.19.48mdk-1-1mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/kernel-source-2.4.19-48mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/kernel-2.4.19.48mdk-1-1mdk.src.rpm

Mandrake Corporate Server 3.0
x86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-enterprise-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-i686-up-4GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-p3-smp-64GB-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-secure-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.4.25.13mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-smp-2.6.3.25mdk-1-1mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.4.25-13mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/RPMS/kernel-source-stripped-2.6.3-25mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.4.25.13mdk-1-1mdk.src.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/3.0/SRPMS/kernel-2.6.3.25mdk-1-1mdk.src.rpm

Red Hat Linux
Red Hat Desktop (v. 3)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
https://rhn.redhat.com/

Red Hat Linux (ia32el)
Red Hat Enterprise Linux AS (v. 3)
Red Hat Enterprise Linux ES (v. 3)
Red Hat Enterprise Linux WS (v. 3)
https://rhn.redhat.com/

SGI
Advanced Linux Environment 3 / Patch 10290
ftp://patches.sgi.com/support/free/security/patches/ProPack/2.4/

Debian (kernel 2.4.16)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16.orig.tar.gz
ARM
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-lart/kernel-image-2.4.16-lart_20040419woody1_arm.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-headers-2.4.16_20040419woody1_arm.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-netwinder/kernel-image-2.4.16-netwinder_20040419woody1_arm.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.16-riscpc/kernel-image-2.4.16-riscpc_20040419woody1_arm.deb
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-doc-2.4.16_2.4.16-1woody3_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.16/kernel-source-2.4.16_2.4.16-1woody3_all.deb

Debian (kernel 2.4.18)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18.orig.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-alpha_2.4.18-15woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-i386_2.4.18-13.2.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-doc-2.4.18_2.4.18-14.4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.18/kernel-source-2.4.18_2.4.18-14.4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-patch-2.4.18-powerpc_2.4.18-1woody6_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-benh/kernel-patch-benh_20020304woody1_all.deb
Alpha
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-generic_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-headers-2.4.18-1-smp_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-generic_2.4.18-15woody1_alpha.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-alpha/kernel-image-2.4.18-1-smp_2.4.18-15woody1_alpha.deb
Intel IA-32
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-386_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-586tsc_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-686-smp_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k6_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-headers-2.4.18-1-k7_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-386_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-586tsc_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-686-smp_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k6_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-image-2.4.18-1-k7_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-386_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-586tsc_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-686-smp_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k6_2.4.18-13.2_i386.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-1-i386/kernel-pcmcia-modules-2.4.18-1-k7_2.4.18-13.2_i386.deb
PowerPC
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.18-powerpc-xfs/kernel-image-2.4.18-powerpc-xfs_20020329woody1_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-headers-2.4.18_2.4.18-1woody6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-newpmac_2.4.18-1woody6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc_2.4.18-1woody6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.18-powerpc/kernel-image-2.4.18-powerpc-smp_2.4.18-1woody6_powerpc.deb

Debian (kernel 2.4.19)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-sparc-2.4_26woody1.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3.diff.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19.orig.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.18-sparc_22woody1_all.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-headers-2.4.19-sparc_26woody1_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-patch-2.4.19-mips_2.4.19-0.020911.1.woody5_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-doc-2.4.19_2.4.19-4.woody3_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.19/kernel-source-2.4.19_2.4.19-4.woody3_all.deb
Sun Sparc
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u_22woody1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.18-sun4u-smp_22woody1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u_26woody1_sparc.deb
http://security.debian.org/pool/updates/main/k/kernel-image-sparc-2.4/kernel-image-2.4.19-sun4u-smp_26woody1_sparc.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-headers-2.4.19_2.4.19-0.020911.1.woody5_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r4k-ip22_2.4.19-0.020911.1.woody5_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/kernel-image-2.4.19-r5k-ip22_2.4.19-0.020911.1.woody5_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.19-mips/mips-tools_2.4.19-0.020911.1.woody5_mips.deb

Debian (kernel 2.4.17)

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-hppa_32.5.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-ia64_011226.18.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.dsc
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.dsc
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4.tar.gz
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.dsc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4.tar.gz
Architecture independent
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-source-2.4.17-hppa_32.5_all.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-source-2.4.17-ia64_011226.18_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody7_all.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody4_all.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_all.deb
HP Precision
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-headers-2.4.17-hppa_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-32-smp_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-hppa/kernel-image-2.4.17-64-smp_32.5_hppa.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_hppa.deb
Intel IA-64
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-headers-2.4.17-ia64_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-itanium-smp_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-ia64/kernel-image-2.4.17-mckinley-smp_011226.18_ia64.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody4_ia64.deb
IBM S/390
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.5_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.5_s390.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_s390.deb
PowerPC
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-headers-2.4.17-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-2.4.17-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-image-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-apus/kernel-patch-2.4.17-apus_2.4.17-6_powerpc.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_powerpc.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody7_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody7_mips.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r3k-kn02_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-kn04_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-patch-2.4.17-mips/mips-tools_2.4.17-0.020226.2.woody7_mipsel.deb
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_mipsel.deb
Alpha
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_alpha.deb
ARM
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_i386.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_m68k.deb
Sun Sparc
http://security.debian.org/pool/updates/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody3_sparc.deb

Identificadores estándar

Propiedad Valor
CVE CAN-2004-1070
CAN-2004-1071
CAN-2004-1072
CAN-2004-1073
CAN-2004-1074
BID

Recursos adicionales

ISEC security advisory (isec-0017)
http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt

Linux SuSE security advisory (SUSE-SA:2004:042)
http://www.suse.de/de/security/2004_42_kernel.html

Linux Fedora security advisory (FEDORA-2004-451)
http://www.redhat.com/archives/fedora-announce-list/2004-November/msg00063.html

Red Hat Linux Security Advisory (RHSA-2004:549-10)
https://rhn.redhat.com/errata/RHSA-2004-549.html

Red Hat Linux Security Advisory (RHSA-2004:504-13)
https://rhn.redhat.com/errata/RHSA-2004-504.html

Red Hat Linux Security Advisory (RHSA-2004:505-14)
https://rhn.redhat.com/errata/RHSA-2004-505.html

Red Hat Security Advisory RHSA-2005:293-16
https://rhn.redhat.com/errata/RHSA-2005-293.html

Red Hat Security Advisory RHSA-2005:275-09
https://rhn.redhat.com/errata/RHSA-2005-275.html

Red Hat Security Advisory (RHSA-2006:0190-5)
https://rhn.redhat.com/errata/RHSA-2006-0190.html

Red Hat Security Advisory (RHSA-2006:0191-9)
https://rhn.redhat.com/errata/RHSA-2006-0191.html

Mandrakesoft Security Advisories MDKSA-2005:022
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2005:022

SGI Security Advisory (20060402-01-U)
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U.asc

Debian Security Advisory (DSA 1067-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00152.html

Debian Security Advisory (DSA 1069-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00156.html

Debian Security Advisory (DSA 1070-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00155.html

Debian Security Advisory (DSA 1082-1)
http://lists.debian.org/debian-security-announce/debian-security-announce-2006/msg00168.html

Histórico de versiones

Versión Comentario Fecha
1.0 Aviso emitido 2004-12-02
1.1 Aviso emitido por Red Hat Linux (RHSA-2004:549-10) 2004-12-03
1.2 Nuevos parches emitidos por Red Hat Linux (RHSA-2004:504-13) y (RHSA-2004:505-14) 2004-12-14
1.3 Aviso emitido por Mandrake (MDKSA-2005:022) 2005-01-26
1.4 Aviso emitido por Red Hat (RHSA-2005:293-16) 2005-04-25
1.5 Aviso emitido por Red Hat (RHSA-2005:275-09) 2005-05-19
1.6 Avisos emitidos por Red Hat (RHSA-2006:0190-5, RHSA-2006:0191-9) 2006-02-02
1.7 Aviso emitido por SGI (20060402-01-U) 2006-04-11
1.8 Aviso emitido por Debian (DSA 1067-1, DSA 1069-1, DSA 1070-1) 2006-05-22
1.9 Aviso emitido por Debian (DSA 1082-1) 2006-05-31

Miembros de

Ministerio de Defensa
CNI
CCN
CCN-CERT