Debian Security Advisory
DSA-1749-1 linux-2.6 -- denial of service/privilege escalation/sensitive memory leak
- Date Reported:
- 20 Mar 2009
- Affected Packages:
- linux-2.6
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2009-0029, CVE-2009-0031, CVE-2009-0065, CVE-2009-0269, CVE-2009-0322, CVE-2009-0676, CVE-2009-0675, CVE-2009-0745, CVE-2009-0746, CVE-2009-0747, CVE-2009-0748.
- More information:
-
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:
- CVE-2009-0029
Christian Borntraeger discovered an issue effecting the alpha, mips, powerpc, s390 and sparc64 architectures that allows local users to cause a denial of service or potentially gain elevated privileges.
- CVE-2009-0031
Vegard Nossum discovered a memory leak in the keyctl subsystem that allows local users to cause a denial of service by consuming all of kernel memory.
- CVE-2009-0065
Wei Yongjun discovered a memory overflow in the SCTP implementation that can be triggered by remote users.
- CVE-2009-0269
Duane Griffin provided a fix for an issue in the eCryptfs subsystem which allows local users to cause a denial of service (fault or memory corruption).
- CVE-2009-0322
Pavel Roskin provided a fix for an issue in the dell_rbu driver that allows a local user to cause a denial of service (oops) by reading 0 bytes from a sysfs entry.
- CVE-2009-0676
Clement LECIGNE discovered a bug in the sock_getsockopt function that may result in leaking sensitive kernel memory.
- CVE-2009-0675
Roel Kluin discovered inverted logic in the skfddi driver that permits local, unprivileged users to reset the driver statistics.
- CVE-2009-0745
Peter Kerwien discovered an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) during a resize operation.
- CVE-2009-0746
Sami Liedes reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when accessing a specially crafted corrupt filesystem.
- CVE-2009-0747
David Maciejak reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem.
- CVE-2009-0748
David Maciejak reported an additional issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem.
For the oldstable distribution (etch), these problems, where applicable, will be fixed in future updates to linux-2.6 and linux-2.6.24.
For the stable distribution (lenny), these problems have been fixed in version 2.6.26-13lenny2.
We recommend that you upgrade your linux-2.6 packages.
- CVE-2009-0029
- Fixed in:
-
Debian GNU/Linux 5.0 (lenny)
- Source:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-13lenny2.diff.gz
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-13lenny2.dsc
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-1_2.6.26-13lenny2_all.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-13lenny2_all.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-13lenny2_all.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-13lenny2_all.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-13lenny2_all.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-13lenny2_all.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-13lenny2_all.deb
- Alpha:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-alpha-smp_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-alpha-smp_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-alpha-generic_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-alpha-legacy_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-alpha_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-alpha-generic_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-alpha-legacy_2.6.26-13lenny2_alpha.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-alpha-smp_2.6.26-13lenny2_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-openvz-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-openvz_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-xen_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-openvz-amd64_2.6.26-13lenny2_amd64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-amd64_2.6.26-13lenny2_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-footbridge_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-orion5x_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-orion5x_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-ixp4xx_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-iop32x_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-arm_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-ixp4xx_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-iop32x_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-footbridge_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_arm.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_arm.deb
- ARM EABI:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-orion5x_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-ixp4xx_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-versatile_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-iop32x_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-ixp4xx_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-armel_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-iop32x_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-orion5x_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-versatile_2.6.26-13lenny2_armel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_armel.deb
- HP Precision:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc64_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc-smp_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-hppa_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc64-smp_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc64_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc-smp_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc64-smp_2.6.26-13lenny2_hppa.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc-smp_2.6.26-13lenny2_hppa.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-686-bigmem_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-openvz-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-686-bigmem_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-amd64_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-686-bigmem_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-xen_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-686-bigmem_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-openvz_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-amd64_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-i386_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-486_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-486_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-openvz-686_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_i386.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-openvz-686_2.6.26-13lenny2_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-itanium_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-mckinley_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-mckinley_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-itanium_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-mckinley_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-ia64_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-itanium_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-itanium_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-mckinley_2.6.26-13lenny2_ia64.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-mckinley_2.6.26-13lenny2_ia64.deb
- Big-endian MIPS:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-4kc-malta_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-r5k-ip32_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-mips_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-r4k-ip22_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-5kc-malta_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-r4k-ip22_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-r5k-ip32_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-4kc-malta_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-5kc-malta_2.6.26-13lenny2_mips.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-4kc-malta_2.6.26-13lenny2_mips.deb
- Little-endian MIPS:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-5kc-malta_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-mipsel_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-r5k-cobalt_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-r5k-cobalt_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-5kc-malta_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-4kc-malta_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-4kc-malta_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_mipsel.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-powerpc_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-powerpc64_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-powerpc-smp_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-powerpc_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-powerpc64_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-powerpc_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-powerpc_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-powerpc64_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-powerpc64_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-powerpc_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-powerpc-smp_2.6.26-13lenny2_powerpc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-powerpc_2.6.26-13lenny2_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-s390x_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-s390x_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-s390_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-s390_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-s390x_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-s390_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-s390-tape_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-s390x_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_s390.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-s390x_2.6.26-13lenny2_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-sparc64_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-sparc_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sparc64-smp_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sparc64-smp_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sparc64_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-sparc64_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sparc64_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_sparc.deb
- http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_sparc.deb
MD5 checksums of the listed files are available in the original advisory.