|
|
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] kernel exploit fix (SSA:2008-042-01)
Date: Mon, 11 Feb 2008 18:00:01 -0800 (PST) |
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] kernel exploit fix (SSA:2008-042-01)
New kernel packages are available for Slackware 12.0, and -current to
fix a local root exploit.
More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz:
All of these kernel upgrades fix yesterday's local root exploit.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
(* Security fix *)
patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
(* Security fix *)
patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz:
(* Security fix *)
patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
(* Security fix *)
If you use lilo, don't forget to run it again after the upgrade.
+--------------------------+
Where to find the new packages:
+-----------------------------+
HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
The kernel patch used for the Slackware 12.0 Linux 2.6.21.5 kernel may be found here:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/source/kernel-source/splice.c.diff.gz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-2.6.23.16-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-smp-2.6.23.16_smp-i686-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-2.6.23.16-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-smp-2.6.23.16_smp-i686-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-2.6.23.16-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-smp-2.6.23.16_smp-i686-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/kernel-headers-2.6.23.16_smp-i386-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/k/kernel-source-2.6.23.16_smp-noarch-1.tgz
MD5 signatures:
+-------------+
Slackware 12.0 packages:
ebf025aa30af925ac6817fe58811e921 kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
e35c66f2d765a221b509f1b7b463c9fe kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
3f9e3783dd7d799a277ec3e79e8bb82d kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
0503193191731bba693ed6ce35b8c26d kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
Slackware -current packages:
ec7ac93d303037392d1257a26280a47d kernel-generic-2.6.23.16-i486-1.tgz
51eb6a85e88f769165b8759a3b391ac9 kernel-generic-smp-2.6.23.16_smp-i686-1.tgz
14729d0653b4f613233ec9501a12fa15 kernel-huge-2.6.23.16-i486-1.tgz
50448f876c0285667902e8b93836ab4b kernel-huge-smp-2.6.23.16_smp-i686-1.tgz
194c5c4b0743c4d611eb3de90c4b3015 kernel-modules-2.6.23.16-i486-1.tgz
fe7eb7e5e4f09353a88db9326fbcd9a9 kernel-modules-smp-2.6.23.16_smp-i686-1.tgz
Installation instructions:
+------------------------+
Upgrade the appropriate package as root:
# upgradepkg kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
Then, if you use lilo rerun it to update the boot loader.
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFHsOecakRjwEAQIjMRAr5pAJ9rkajzNsWTg8LTrtUbt+hQEdbgVQCeI+sh
JR1JuNml4YXSqJpOFA/iF3c=
=DJPk
-----END PGP SIGNATURE-----
|
| |