Your message dated Fri, 5 Jan 2007 22:08:57 +0100
with message-id <[EMAIL PROTECTED]>
and subject line woody bug
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: kernel-image-2.4.16-i386
Version: 2.4.26-2
Priority: important
Justification: Possible  arbitrary code execution
Tags: security sid woody sarge

I've just seen an announcement for a "Linux Kernel e1000 Ethernet Card 
Driver Buffer Overflow Vulnerability", published as Bugtraq ID 10352
(http://www.securityfocus.com/bid/10352) it seems to affect all kernel 
versions 2.4 and up, so that includes kernel 2.4.16-1, 2.4.17 and 2.4.18,  
in woody as well as newer kernel versions in sarge and sid.

Reviewing the recent kernel vulnerabilities, the following seem to affect
the current kernels in woody (and sarge, sid)

- CAN-2004-0427, BID-10221 (Linux kernel do_fork() Memory Leakage 
Vulnerability)
- CAN-2004-0394, BID-10233 (Linux Kernel Panic Function Call Buffer 
Overflow 
Vulnerability)
- CAN-2004-0181, BID-10143 (Linux Kernel JFS File System Information 
Leakage Vulnerability)
- BID-10352 (Linux Kernel e1000 Ethernet Card Driver Buffer Overflow 
Vulnerability)

Regards

Javier

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
woody is no longer supported.
-- 
Martin Michlmayr
http://www.cyrius.com/

--- End Message ---

Reply via email to