[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-source-2.4.17 2.4.17-1woody1 (i386 source all)

Hash: SHA1

Format: 1.7
Date: Tue, 10 Jun 2003 14:56:08 -0400
Source: kernel-source-2.4.17
Binary: kernel-doc-2.4.17 kernel-source-2.4.17 mkcramfs
Architecture: source all i386
Version: 2.4.17-1woody1
Distribution: stable-security
Urgency: high
Maintainer: Herbert Xu <herbert@debian.org>
Changed-By: Matt Zimmerman <mdz@debian.org>
 kernel-doc-2.4.17 - Linux kernel specific documentation for version 2.4.17.
 kernel-source-2.4.17 - Linux kernel source for version 2.4.17
 mkcramfs   - Make a CramFs (Compressed ROM File System)
 kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
   * Non-maintainer upload by the Security Team
   * Apply security fixes from 2.4.18-9
     - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
       drivers do not pad frames with null bytes, which allows remote
       attackers to obtain information from previous packets or kernel
       memory by using malformed packets
     - CAN-2003-0127: The kernel module loader allows local users to gain
       root privileges by using ptrace to attach to a child process that
       is spawned by the kernel
     - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
       Netfilter IP conntrack module, allows remote attackers to cause a
       denial of service (CPU consumption) via packets with forged
       source addresses that cause a large number of hash table
       collisions related to the PREROUTING chain
     - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
       does not properly restrict privileges, which allows local users to
       gain read or write access to certain I/O ports.
     - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
       kernels 2.4.18 and earlier on x86 systems allow local users to kill
       arbitrary processes via a a binary compatibility interface (lcall)
     - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
       modify CPU state registers via a malformed address.
     - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
       allows attackers to cause a denial of service ("kernel oops")
     - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
       kernel 2.4 allows remote attackers to cause a denial of service (CPU
       consumption) via certain packets that cause a large number of hash
       table collisions
 4c2994b996abb2960711fe1e6e962712 690 devel optional kernel-source-2.4.17_2.4.17-1woody1.dsc
 d5de2a4dc49e32c37e557ef856d5d132 29445154 devel optional kernel-source-2.4.17_2.4.17.orig.tar.gz
 4cec4a35b4bbd27a9f54a6c9d9dc5019 38092 devel optional kernel-source-2.4.17_2.4.17-1woody1.diff.gz
 ec59d9331d0654a67859c40ab3abf260 1719692 doc optional kernel-doc-2.4.17_2.4.17-1woody1_all.deb
 031649d73da791becf1c4f0c69d13ce1 23878706 devel optional kernel-source-2.4.17_2.4.17-1woody1_all.deb
 46fa25b8cce097c219e16d96947abb7d 14876 utils optional mkcramfs_2.4.17-1woody1_i386.deb

Version: GnuPG v1.2.2 (GNU/Linux)


  to pool/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody1_all.deb
  to pool/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1.diff.gz
  to pool/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1.dsc
  to pool/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1_all.deb
  to pool/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_i386.deb

Reply to: