|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] kernel (SSA:2019-169-01)
Date: Tue, 18 Jun 2019 15:33:08 -0700 (PDT) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] kernel (SSA:2019-169-01)
New kernel packages are available for Slackware 14.2 and -current to
fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/linux-4.4.182/*: Upgraded.
These updates fix various bugs and many security issues, including the
"SACK Panic" remote denial-of-service issue.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.174:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391
Fixed in 4.4.175:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7221
Fixed in 4.4.176:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6974
Fixed in 4.4.177:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9213
Fixed in 4.4.178:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460
Fixed in 4.4.179:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190
Fixed in 4.4.180:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
Fixed in 4.4.181:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20510
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
Fixed in 4.4.182:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-firmware-20190618_acb56f2-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-generic-4.4.182-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-generic-smp-4.4.182_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-headers-4.4.182_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-huge-4.4.182-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-huge-smp-4.4.182_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-modules-4.4.182-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-modules-smp-4.4.182_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.182/kernel-source-4.4.182_smp-noarch-1.txz
Updated packages for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.182/kernel-firmware-20190618_acb56f2-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.182/kernel-generic-4.4.182-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.182/kernel-headers-4.4.182-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.182/kernel-huge-4.4.182-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.182/kernel-modules-4.4.182-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.182/kernel-source-4.4.182-noarch-1.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-firmware-20190618_acb56f2-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-4.19.52-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-smp-4.19.52_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-4.19.52-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-smp-4.19.52_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-4.19.52-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-smp-4.19.52_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/kernel-headers-4.19.52_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/k/kernel-source-4.19.52_smp-noarch-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-firmware-20190618_acb56f2-noarch-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-generic-4.19.52-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-huge-4.19.52-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-modules-4.19.52-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/kernel-headers-4.19.52-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/k/kernel-source-4.19.52-noarch-1.txz
MD5 signatures:
+-------------+
Slackware 14.2 packages:
7e35011c927708358440293a846a92e2 kernel-firmware-20190618_acb56f2-noarch-1.txz
f21f4693c88ff81db4ac28d5f3da8c1f kernel-generic-4.4.182-i586-1.txz
cfbeb74f3a26654a1327c1797c53b308 kernel-generic-smp-4.4.182_smp-i686-1.txz
65ce3cce23201d024ee43541be370bb0 kernel-headers-4.4.182_smp-x86-1.txz
96a79b7e783b8da26ce57bd6af8d779b kernel-huge-4.4.182-i586-1.txz
4719e1b973f3933433e4415800429c0d kernel-huge-smp-4.4.182_smp-i686-1.txz
5212ef16bc083452a54b8ccbff12d596 kernel-modules-4.4.182-i586-1.txz
42e842f54089910e4f9d67d4314bcd9b kernel-modules-smp-4.4.182_smp-i686-1.txz
c0f5a852dfdb8319dbd701b31fa91443 kernel-source-4.4.182_smp-noarch-1.txz
Slackware x86_64 14.2 packages:
7e35011c927708358440293a846a92e2 kernel-firmware-20190618_acb56f2-noarch-1.txz
fd81ad5463823e28089f243dde751440 kernel-generic-4.4.182-x86_64-1.txz
a21cbee53644b1ba8a58de51646794d9 kernel-headers-4.4.182-x86-1.txz
eeb7f315d09021cdbb9c126170b0b5c7 kernel-huge-4.4.182-x86_64-1.txz
b846ac2d900f07db3f16fe5eb248c958 kernel-modules-4.4.182-x86_64-1.txz
f53fa02701f695809365547f02a8dee5 kernel-source-4.4.182-noarch-1.txz
Slackware -current packages:
7e35011c927708358440293a846a92e2 a/kernel-firmware-20190618_acb56f2-noarch-1.txz
740509fecb9c6ed25b3faed8d79e5968 a/kernel-generic-4.19.52-i586-1.txz
f083387da0284a9202b75af340cec625 a/kernel-generic-smp-4.19.52_smp-i686-1.txz
38253b9f36e98ed1484d0772709dafff a/kernel-huge-4.19.52-i586-1.txz
6c862482d321440dbd19f95c1435b05f a/kernel-huge-smp-4.19.52_smp-i686-1.txz
fb2cd9af8b15cb977892e128ba27f02d a/kernel-modules-4.19.52-i586-1.txz
903b10263d69754768414a69a1f65308 a/kernel-modules-smp-4.19.52_smp-i686-1.txz
b81c2fd8aaad8607c535f72d8da8ef97 d/kernel-headers-4.19.52_smp-x86-1.txz
a59a5275305e8c15c7e967fb35ca7186 k/kernel-source-4.19.52_smp-noarch-1.txz
Slackware x86_64 -current packages:
7e35011c927708358440293a846a92e2 a/kernel-firmware-20190618_acb56f2-noarch-1.txz
f39c2280b351d3048150d373254327b2 a/kernel-generic-4.19.52-x86_64-1.txz
f3acfeac8e950d74e250bc7ba3f04e58 a/kernel-huge-4.19.52-x86_64-1.txz
e5a523195188a7ff84d0eb7245046d90 a/kernel-modules-4.19.52-x86_64-1.txz
4342b388a8363335e9083ea2521842b4 d/kernel-headers-4.19.52-x86-1.txz
21049a90ec97be84a4353083e6d74005 k/kernel-source-4.19.52-noarch-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg kernel-*.txz
If you are using an initrd, you'll need to rebuild it.
For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.182-smp | bash
For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.182 | bash
Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren't sure which
kernel you are running, run "uname -a". If you see SMP there, you are
running the SMP kernel and should use the 4.4.182-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit
systems should always use 4.4.182 as the version.
If you are using lilo or elilo to boot the machine, you'll need to ensure
that the machine is properly prepared before rebooting.
If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel. No editing should be required
unless your machine uses a custom lilo.conf. If that is the case, be sure
that the image= line references the correct kernel file. Either way,
you'll need to run "lilo" as root to reinstall the boot loader.
If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
iEYEARECAAYFAl0JXiwACgkQakRjwEAQIjOvYACfbBAeMbuPR6gDF3rxyZaO27s8
nGIAoI8inFLP3vo74MH0Kf2c5kvl9Ief
=+QhE
-----END PGP SIGNATURE-----
|
| |