[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-2.4.18-i386bf 2.4.18-5woody1 (i386 source)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed,  4 Jun 2003 21:56:28 -0400
Source: kernel-image-2.4.18-i386bf
Binary: kernel-image-2.4.18-bf2.4 kernel-headers-2.4.18-bf2.4
Architecture: source i386
Version: 2.4.18-5woody1
Distribution: stable-security
Urgency: high
Maintainer: Eduard Bloch <blade@debian.org>
Changed-By: Matt Zimmerman <mdz@debian.org>
Description: 
 kernel-headers-2.4.18-bf2.4 - Headers for Linux kernel version 2.4.18 (bf variant) on 386
 kernel-image-2.4.18-bf2.4 - Linux kernel image for version 2.4.18 (bf variant) on 386.
Changes: 
 kernel-image-2.4.18-i386bf (2.4.18-5woody1) stable-security; urgency=high
 .
   * Non-maintainer upload by the Security Team
   * Build against kernel-source-2.4.18 2.4.18-9, fixing several
     security vulnerabilities:
     - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
       drivers do not pad frames with null bytes, which allows remote
       attackers to obtain information from previous packets or kernel
       memory by using malformed packets
     - CAN-2003-0127: The kernel module loader allows local users to gain
       root privileges by using ptrace to attach to a child process that
       is spawned by the kernel
     - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
       Netfilter IP conntrack module, allows remote attackers to cause a
       denial of service (CPU consumption) via packets with forged
       source addresses that cause a large number of hash table
       collisions related to the PREROUTING chain
     - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
       does not properly restrict privileges, which allows local users to
       gain read or write access to certain I/O ports.
     - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
       kernels 2.4.18 and earlier on x86 systems allow local users to kill
       arbitrary processes via a a binary compatibility interface (lcall)
     - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
       modify CPU state registers via a malformed address.
     - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
       allows attackers to cause a denial of service ("kernel oops")
     - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
       kernel 2.4 allows remote attackers to cause a denial of service (CPU
       consumption) via certain packets that cause a large number of hash
       table collisions
Files: 
 d3a0a6b26b6282d9ba8af5c2f7008378 653 devel optional kernel-image-2.4.18-i386bf_2.4.18-5woody1.dsc
 66fe5aac9c60c4dfa865d563dfbbaed5 25420 devel optional kernel-image-2.4.18-i386bf_2.4.18-5woody1.tar.gz
 d510d8aaedbeb91fa2e90e9cabf5b39b 6423164 base optional kernel-image-2.4.18-bf2.4_2.4.18-5woody1_i386.deb
 325717b6867a715d5a0ef8364d8cb29c 3409156 devel optional kernel-headers-2.4.18-bf2.4_2.4.18-5woody1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+487hArxCt0PiXR4RAs95AJ9JLAy4PAc1FVdG08kk9Et8Zx1XKgCfW4VW
SKO0kugvzXU1NEa29zcJ6p8=
=PdUJ
-----END PGP SIGNATURE-----


Accepted:
kernel-headers-2.4.18-bf2.4_2.4.18-5woody1_i386.deb
  to pool/main/k/kernel-image-2.4.18-i386bf/kernel-headers-2.4.18-bf2.4_2.4.18-5woody1_i386.deb
kernel-image-2.4.18-bf2.4_2.4.18-5woody1_i386.deb
  to pool/main/k/kernel-image-2.4.18-i386bf/kernel-image-2.4.18-bf2.4_2.4.18-5woody1_i386.deb
kernel-image-2.4.18-i386bf_2.4.18-5woody1.dsc
  to pool/main/k/kernel-image-2.4.18-i386bf/kernel-image-2.4.18-i386bf_2.4.18-5woody1.dsc
kernel-image-2.4.18-i386bf_2.4.18-5woody1.tar.gz
  to pool/main/k/kernel-image-2.4.18-i386bf/kernel-image-2.4.18-i386bf_2.4.18-5woody1.tar.gz



Reply to: