Accepted kernel-patch-2.4.17-s390 0.0.20020816-0.woody.2 (all source)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 18 Feb 2004 10:45:08 +0100
Source: kernel-patch-2.4.17-s390
Binary: kernel-patch-2.4.17-s390
Architecture: source all
Version: 0.0.20020816-0.woody.2
Distribution: stable-security
Urgency: high
Maintainer: Arnd Bergmann <arnd@debian.org>
Changed-By: Arnd Bergmann <arnd@debian.org>
Description:
kernel-patch-2.4.17-s390 - Diffs to the Linux kernel source 2.4.17 for IBM S/390
Changes:
kernel-patch-2.4.17-s390 (0.0.20020816-0.woody.2) stable-security; urgency=high
.
* Rebuild against latest kernel-source-2.4.17-1woody2), which includes
the follwing additional security fixes:
- CAN-2003-0961: Added TASK_SIZE check to do_brk() [mm/mmap.c]
- CAN-2003-0985: Applied patch by Andrea Arcangeli to fix local
privilege escalation discovered by Paul Starzetz [mm/mremap.c]
- CAN-2004-0077: Applied patch extracted from Solar Designer's Owl
patched kernel to fix local privilege escalation discovered by Paul
Starzetz [mm/mremap.c]
- CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
drivers do not pad frames with null bytes, which allows remote
attackers to obtain information from previous packets or kernel
memory by using malformed packets
- CAN-2003-0244: The route cache implementation in Linux 2.4, and the
Netfilter IP conntrack module, allows remote attackers to cause a
denial of service (CPU consumption) via packets with forged
source addresses that cause a large number of hash table
collisions related to the PREROUTING chain
- CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
does not properly restrict privileges, which allows local users to
gain read or write access to certain I/O ports.
- CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
kernels 2.4.18 and earlier on x86 systems allow local users to kill
arbitrary processes via a a binary compatibility interface (lcall)
- CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
modify CPU state registers via a malformed address.
- CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
allows attackers to cause a denial of service ("kernel oops")
- CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
kernel 2.4 allows remote attackers to cause a denial of service (CPU
consumption) via certain packets that cause a large number of hash
table collisions
* Resolve a conflict between the previous fix for CAN-2003-0127 and the
new kernel-source
* New Maintainer
Files:
8f59252c74198c796f544ac312cbf522 754 devel extra kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2.dsc
81d3c045df500f3e2da56de87b4c434d 5824 devel extra kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2.diff.gz
03b0017cad1c479c4109c0ad5f072ab0 300766 devel extra kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2_all.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
iD8DBQFAM4/N5t5GS2LDRf4RAlnDAJwOQGnR0r7appAL55oXQgkkPU3FGACfV441
XLjCT1xOkcHSpkntn8gFNIk=
=Xm4r
-----END PGP SIGNATURE-----
Accepted:
kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2.diff.gz
to pool/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2.diff.gz
kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2.dsc
to pool/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2.dsc
kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2_all.deb
to pool/main/k/kernel-patch-2.4.17-s390/kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2_all.deb
Reply to: