[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Accepted kernel-image-2.4.17-s390 2.4.17-2.woody.3 (source s390)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Wed, 18 Feb 2003 12:15:23 +0100
Source: kernel-image-2.4.17-s390
Binary: kernel-image-2.4.17-s390 kernel-headers-2.4.17
Architecture: source s390
Version: 2.4.17-2.woody.3
Distribution: stable-security
Urgency: high
Maintainer: Arnd Bergmann <arnd@debian.org>
Changed-By: Arnd Bergmann <arnd@debian.org>
Description: 
 kernel-headers-2.4.17 - Header files related to Linux kernel version 2.4.17 on IBM S/390
 kernel-image-2.4.17-s390 - Linux kernel image for kernel version 2.4.17 on IBM S/390
Changes: 
 kernel-image-2.4.17-s390 (2.4.17-2.woody.3) stable-security; urgency=high
 .
   * Rebuild against latest kernel-patch-2.4.17-s390_0.0.20020816-0.woody.2,
     which includes the follwing additional security fixes:
     - CAN-2003-0961: Added TASK_SIZE check to do_brk() [mm/mmap.c]
     - CAN-2003-0985: Applied patch by Andrea Arcangeli to fix local
       privilege escalation discovered by Paul Starzetz [mm/mremap.c]
     - CAN-2004-0077: Applied patch extracted from Solar Designer's Owl
       patched kernel to fix local privilege escalation discovered by Paul
       Starzetz [mm/mremap.c]
     - CAN-2003-0001: Multiple ethernet Network Interface Card (NIC) device
       drivers do not pad frames with null bytes, which allows remote
       attackers to obtain information from previous packets or kernel
       memory by using malformed packets
     - CAN-2003-0244: The route cache implementation in Linux 2.4, and the
       Netfilter IP conntrack module, allows remote attackers to cause a
       denial of service (CPU consumption) via packets with forged
       source addresses that cause a large number of hash table
       collisions related to the PREROUTING chain
     - CAN-2003-0246: The ioperm system call in Linux kernel 2.4.20 and earlier
       does not properly restrict privileges, which allows local users to
       gain read or write access to certain I/O ports.
     - CVE-2002-0429: The iBCS routines in arch/i386/kernel/traps.c for Linux
       kernels 2.4.18 and earlier on x86 systems allow local users to kill
       arbitrary processes via a a binary compatibility interface (lcall)
     - CAN-2003-0248: The mxcsr code in Linux kernel 2.4 allows attackers to
       modify CPU state registers via a malformed address.
     - CAN-2003-0247: vulnerability in the TTY layer of the Linux kernel 2.4
       allows attackers to cause a denial of service ("kernel oops")
     - CAN-2003-0364: The TCP/IP fragment reassembly handling in the Linux
       kernel 2.4 allows remote attackers to cause a denial of service (CPU
       consumption) via certain packets that cause a large number of hash
       table collisions
   * New Maintainer
Files: 
 fd4b67d1ba928ded93263c2d95327b65 793 devel optional kernel-image-2.4.17-s390_2.4.17-2.woody.3.dsc
 50f9e176f8d7fbf6eb6124bf864e6c48 7866 devel optional kernel-image-2.4.17-s390_2.4.17-2.woody.3.tar.gz
 84663c81b952cfa9407c84985f5623d7 3335312 devel optional kernel-headers-2.4.17_2.4.17-2.woody.3_s390.deb
 b5cd48b7cde59c3893c983d95e451a23 1342758 base optional kernel-image-2.4.17-s390_2.4.17-2.woody.3_s390.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAM4+65t5GS2LDRf4RAsLHAKCiNy8OSH3MFsnDVmVDFQ0GWmXptwCfZ+hp
OT91tF1SEqUj/hUj6jkEiFI=
=d7P4
-----END PGP SIGNATURE-----


Accepted:
kernel-headers-2.4.17_2.4.17-2.woody.3_s390.deb
  to pool/main/k/kernel-image-2.4.17-s390/kernel-headers-2.4.17_2.4.17-2.woody.3_s390.deb
kernel-image-2.4.17-s390_2.4.17-2.woody.3.dsc
  to pool/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.3.dsc
kernel-image-2.4.17-s390_2.4.17-2.woody.3.tar.gz
  to pool/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.3.tar.gz
kernel-image-2.4.17-s390_2.4.17-2.woody.3_s390.deb
  to pool/main/k/kernel-image-2.4.17-s390/kernel-image-2.4.17-s390_2.4.17-2.woody.3_s390.deb



Reply to: