DSA-1749-1 linux-2.6 -- denial of service/privilege escalation/sensitive memory leak

Related Vulnerabilities: CVE-2009-0029   CVE-2009-0031   CVE-2009-0065   CVE-2009-0269   CVE-2009-0322   CVE-2009-0676   CVE-2009-0675   CVE-2009-0745   CVE-2009-0746   CVE-2009-0747   CVE-2009-0748  

Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0029 Christian Borntraeger discovered an issue effecting the alpha, mips, powerpc, s390 and sparc64 architectures that allows local users to cause a denial of service or potentially gain elevated privileges. CVE-2009-0031 Vegard Nossum discovered a memory leak in the keyctl subsystem that allows local users to cause a denial of service by consuming all of kernel memory. CVE-2009-0065 Wei Yongjun discovered a memory overflow in the SCTP implementation that can be triggered by remote users. CVE-2009-0269 Duane Griffin provided a fix for an issue in the eCryptfs subsystem which allows local users to cause a denial of service (fault or memory corruption). CVE-2009-0322 Pavel Roskin provided a fix for an issue in the dell_rbu driver that allows a local user to cause a denial of service (oops) by reading 0 bytes from a sysfs entry. CVE-2009-0676 Clement LECIGNE discovered a bug in the sock_getsockopt function that may result in leaking sensitive kernel memory. CVE-2009-0675 Roel Kluin discovered inverted logic in the skfddi driver that permits local, unprivileged users to reset the driver statistics. CVE-2009-0745 Peter Kerwien discovered an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) during a resize operation. CVE-2009-0746 Sami Liedes reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when accessing a specially crafted corrupt filesystem. CVE-2009-0747 David Maciejak reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem. CVE-2009-0748 David Maciejak reported an additional issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem. For the oldstable distribution (etch), these problems, where applicable, will be fixed in future updates to linux-2.6 and linux-2.6.24. For the stable distribution (lenny), these problems have been fixed in version 2.6.26-13lenny2. We recommend that you upgrade your linux-2.6 packages.

Debian Security Advisory

DSA-1749-1 linux-2.6 -- denial of service/privilege escalation/sensitive memory leak

Date Reported:
20 Mar 2009
Affected Packages:
linux-2.6
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2009-0029, CVE-2009-0031, CVE-2009-0065, CVE-2009-0269, CVE-2009-0322, CVE-2009-0676, CVE-2009-0675, CVE-2009-0745, CVE-2009-0746, CVE-2009-0747, CVE-2009-0748.
More information:

Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems:

  • CVE-2009-0029

    Christian Borntraeger discovered an issue effecting the alpha, mips, powerpc, s390 and sparc64 architectures that allows local users to cause a denial of service or potentially gain elevated privileges.

  • CVE-2009-0031

    Vegard Nossum discovered a memory leak in the keyctl subsystem that allows local users to cause a denial of service by consuming all of kernel memory.

  • CVE-2009-0065

    Wei Yongjun discovered a memory overflow in the SCTP implementation that can be triggered by remote users.

  • CVE-2009-0269

    Duane Griffin provided a fix for an issue in the eCryptfs subsystem which allows local users to cause a denial of service (fault or memory corruption).

  • CVE-2009-0322

    Pavel Roskin provided a fix for an issue in the dell_rbu driver that allows a local user to cause a denial of service (oops) by reading 0 bytes from a sysfs entry.

  • CVE-2009-0676

    Clement LECIGNE discovered a bug in the sock_getsockopt function that may result in leaking sensitive kernel memory.

  • CVE-2009-0675

    Roel Kluin discovered inverted logic in the skfddi driver that permits local, unprivileged users to reset the driver statistics.

  • CVE-2009-0745

    Peter Kerwien discovered an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) during a resize operation.

  • CVE-2009-0746

    Sami Liedes reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when accessing a specially crafted corrupt filesystem.

  • CVE-2009-0747

    David Maciejak reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem.

  • CVE-2009-0748

    David Maciejak reported an additional issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem.

For the oldstable distribution (etch), these problems, where applicable, will be fixed in future updates to linux-2.6 and linux-2.6.24.

For the stable distribution (lenny), these problems have been fixed in version 2.6.26-13lenny2.

We recommend that you upgrade your linux-2.6 packages.

Fixed in:

Debian GNU/Linux 5.0 (lenny)

Source:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-13lenny2.diff.gz
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26.orig.tar.gz
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-2.6_2.6.26-13lenny2.dsc
Architecture-independent component:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-support-2.6.26-1_2.6.26-13lenny2_all.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-patch-debian-2.6.26_2.6.26-13lenny2_all.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-manual-2.6.26_2.6.26-13lenny2_all.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-doc-2.6.26_2.6.26-13lenny2_all.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-tree-2.6.26_2.6.26-13lenny2_all.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-source-2.6.26_2.6.26-13lenny2_all.deb
Alpha:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-alpha-smp_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-alpha-smp_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-alpha-generic_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-alpha-legacy_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-alpha_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-alpha-generic_2.6.26-13lenny2_alpha.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-alpha-legacy_2.6.26-13lenny2_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-openvz-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-openvz_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-1-xen-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-xen_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-amd64_2.6.26-13lenny2_amd64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-openvz-amd64_2.6.26-13lenny2_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-footbridge_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-orion5x_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-orion5x_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-ixp4xx_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-iop32x_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-arm_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-ixp4xx_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-iop32x_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-footbridge_2.6.26-13lenny2_arm.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_arm.deb
ARM EABI:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-orion5x_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-ixp4xx_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-versatile_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-iop32x_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-ixp4xx_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-armel_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-iop32x_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-orion5x_2.6.26-13lenny2_armel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-versatile_2.6.26-13lenny2_armel.deb
HP Precision:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc64_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc-smp_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-hppa_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc64-smp_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc64_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-parisc_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc-smp_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc_2.6.26-13lenny2_hppa.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-parisc64-smp_2.6.26-13lenny2_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-686-bigmem_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-openvz-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-686-bigmem_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-amd64_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-686-bigmem_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/xen-linux-system-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-xen_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-686-bigmem_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-modules-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-xen-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-openvz_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-amd64_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-i386_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-486_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-486_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-openvz-686_2.6.26-13lenny2_i386.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-itanium_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-mckinley_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-mckinley_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-itanium_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-mckinley_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-ia64_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-itanium_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-itanium_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_ia64.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-mckinley_2.6.26-13lenny2_ia64.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-4kc-malta_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-r5k-ip32_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-mips_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-r4k-ip22_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-5kc-malta_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-r4k-ip22_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-r5k-ip32_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-4kc-malta_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_mips.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-5kc-malta_2.6.26-13lenny2_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-5kc-malta_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-mipsel_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-r5k-cobalt_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1a-bcm91480b_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-r5k-cobalt_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-5kc-malta_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sb1-bcm91250a_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-4kc-malta_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-4kc-malta_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_mipsel.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-powerpc_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-powerpc64_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-powerpc-smp_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-powerpc_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-powerpc64_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-powerpc_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-powerpc_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-powerpc64_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-powerpc64_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-powerpc_2.6.26-13lenny2_powerpc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-powerpc-smp_2.6.26-13lenny2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-s390x_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-s390x_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-s390_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-s390_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-s390x_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-s390_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-s390-tape_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-s390x_2.6.26-13lenny2_s390.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-vserver-sparc64_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common-vserver_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all-sparc_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sparc64-smp_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sparc64-smp_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-sparc64_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-vserver-sparc64_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-image-2.6.26-1-sparc64_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-libc-dev_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-all_2.6.26-13lenny2_sparc.deb
http://security.debian.org/pool/updates/main/l/linux-2.6/linux-headers-2.6.26-1-common_2.6.26-13lenny2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.