[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-patch-2.4.17-mips 2.4.17-0.020226.2.woody2 (source all mips)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Thu, 12 Jun 2003 10:03:59 +0200
Source: kernel-patch-2.4.17-mips
Binary: kernel-headers-2.4.17 kernel-patch-2.4.17-mips kernel-image-2.4.17-r3k-kn02 kernel-image-2.4.17-r5k-ip22 kernel-image-2.4.17-r4k-kn04 kernel-image-2.4.17-r4k-ip22 mips-tools
Architecture: source mips all
Version: 2.4.17-0.020226.2.woody2
Distribution: stable-security
Urgency: low
Maintainer: Guido Guenther <agx@debian.org>
Changed-By: Guido Guenther <agx@debian.org>
Description: 
 kernel-headers-2.4.17 - Header files related to a specific Linux kernel.
 kernel-image-2.4.17-r4k-ip22 - Linux kernel binary image.
 kernel-image-2.4.17-r5k-ip22 - Linux kernel binary image.
 kernel-patch-2.4.17-mips - Diffs to the kernel source for MIPS
 mips-tools - mips specific kernel tools
Changes: 
 kernel-patch-2.4.17-mips (2.4.17-0.020226.2.woody2) stable-security; urgency=low
 .
   * backout our ptrace fix since this is fixed in kernel-source-2.4.17-1woody1
   * Rebuilt against new kernel-source-2.4.17-1woody1 which fixes:
     - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
       drivers do not pad frames with null bytes, which allows remote
       attackers to obtain information from previous packets or kernel
       memory by using malformed packets
     - CAN-2003-0127: The kernel module loader allows local users to gain
       root privileges by using ptrace to attach to a child process that
       is spawned by the kernel
     - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
       Netfilter IP conntrack module, allows remote attackers to cause a
       denial of service (CPU consumption) via packets with forged
       source addresses that cause a large number of hash table
       collisions related to the PREROUTING chain
     - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
       does not properly restrict privileges, which allows local users to
       gain read or write access to certain I/O ports.
     - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
       kernels 2.4.18 and earlier on x86 systems allow local users to kill
       arbitrary processes via a a binary compatibility interface (lcall)
     - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
       modify CPU state registers via a malformed address.
     - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
       allows attackers to cause a denial of service ("kernel oops")
     - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
       kernel 2.4 allows remote attackers to cause a denial of service (CPU
       consumption) via certain packets that cause a large number of hash
       table collisions
   * remove Readme.Debian from the diff
Files: 
 22545e621e57307760966baa10b841fc 786 devel optional kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc
 9f28eec81b8eb17d10b92655304ee892 1146581 devel optional kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz
 3b24c4ea5d2d64219de78708abe97457 1148854 devel optional kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb
 5d9c3e556d4b25a3966bbd2e1b2db765 2042164 base optional kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb
 02f5c02d1937ef5aed708e975e828b3f 2041978 base optional kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb
 10faf449f8d96e17f6bf250b83de9b09 3475338 devel optional kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE++ZvWArxCt0PiXR4RAkr+AKDeyJSJaZrcI9W16JOJcDDLfrhppQCgiYuQ
ybUmBWlBNNBmnV9pdEuzTZg=
=Eqa8
-----END PGP SIGNATURE-----


Accepted:
kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb
  to pool/main/k/kernel-patch-2.4.17-mips/kernel-headers-2.4.17_2.4.17-0.020226.2.woody2_mips.deb
kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb
  to pool/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r4k-ip22_2.4.17-0.020226.2.woody2_mips.deb
kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb
  to pool/main/k/kernel-patch-2.4.17-mips/kernel-image-2.4.17-r5k-ip22_2.4.17-0.020226.2.woody2_mips.deb
kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc
  to pool/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.dsc
kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz
  to pool/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2.tar.gz
kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb
  to pool/main/k/kernel-patch-2.4.17-mips/kernel-patch-2.4.17-mips_2.4.17-0.020226.2.woody2_all.deb



Reply to: