Accepted kernel-source-2.4.17 2.4.17-1woody1 (i386 source all)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Tue, 10 Jun 2003 14:56:08 -0400
Source: kernel-source-2.4.17
Binary: kernel-doc-2.4.17 kernel-source-2.4.17 mkcramfs
Architecture: source all i386
Version: 2.4.17-1woody1
Distribution: stable-security
Urgency: high
Maintainer: Herbert Xu <herbert@debian.org>
Changed-By: Matt Zimmerman <mdz@debian.org>
Description:
kernel-doc-2.4.17 - Linux kernel specific documentation for version 2.4.17.
kernel-source-2.4.17 - Linux kernel source for version 2.4.17
mkcramfs - Make a CramFs (Compressed ROM File System)
Changes:
kernel-source-2.4.17 (2.4.17-1woody1) stable-security; urgency=high
.
* Non-maintainer upload by the Security Team
* Apply security fixes from 2.4.18-9
- CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
drivers do not pad frames with null bytes, which allows remote
attackers to obtain information from previous packets or kernel
memory by using malformed packets
- CAN-2003-0127: The kernel module loader allows local users to gain
root privileges by using ptrace to attach to a child process that
is spawned by the kernel
- CAN-2003-0244: The route cache implementation in Linux 2.4, and the
Netfilter IP conntrack module, allows remote attackers to cause a
denial of service (CPU consumption) via packets with forged
source addresses that cause a large number of hash table
collisions related to the PREROUTING chain
- CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
does not properly restrict privileges, which allows local users to
gain read or write access to certain I/O ports.
- CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
kernels 2.4.18 and earlier on x86 systems allow local users to kill
arbitrary processes via a a binary compatibility interface (lcall)
- CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
modify CPU state registers via a malformed address.
- CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
allows attackers to cause a denial of service ("kernel oops")
- CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
kernel 2.4 allows remote attackers to cause a denial of service (CPU
consumption) via certain packets that cause a large number of hash
table collisions
Files:
4c2994b996abb2960711fe1e6e962712 690 devel optional kernel-source-2.4.17_2.4.17-1woody1.dsc
d5de2a4dc49e32c37e557ef856d5d132 29445154 devel optional kernel-source-2.4.17_2.4.17.orig.tar.gz
4cec4a35b4bbd27a9f54a6c9d9dc5019 38092 devel optional kernel-source-2.4.17_2.4.17-1woody1.diff.gz
ec59d9331d0654a67859c40ab3abf260 1719692 doc optional kernel-doc-2.4.17_2.4.17-1woody1_all.deb
031649d73da791becf1c4f0c69d13ce1 23878706 devel optional kernel-source-2.4.17_2.4.17-1woody1_all.deb
46fa25b8cce097c219e16d96947abb7d 14876 utils optional mkcramfs_2.4.17-1woody1_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE++jIZArxCt0PiXR4RAqV5AJ9R9hDAkjaXoGLg8lNW3U3oWDdJGACdE0hR
oERud6Gymt+Xo9nA+BuOy7A=
=NXJD
-----END PGP SIGNATURE-----
Accepted:
kernel-doc-2.4.17_2.4.17-1woody1_all.deb
to pool/main/k/kernel-source-2.4.17/kernel-doc-2.4.17_2.4.17-1woody1_all.deb
kernel-source-2.4.17_2.4.17-1woody1.diff.gz
to pool/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1.diff.gz
kernel-source-2.4.17_2.4.17-1woody1.dsc
to pool/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1.dsc
kernel-source-2.4.17_2.4.17-1woody1_all.deb
to pool/main/k/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody1_all.deb
mkcramfs_2.4.17-1woody1_i386.deb
to pool/main/k/kernel-source-2.4.17/mkcramfs_2.4.17-1woody1_i386.deb
Reply to: