Slackware Security Advisories
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] kernel exploit fix (SSA:2008-042-01)
Date: Mon, 11 Feb 2008 18:00:01 -0800 (PST)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  kernel exploit fix (SSA:2008-042-01)

New kernel packages are available for Slackware 12.0, and -current to
fix a local root exploit.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600


Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz:
  All of these kernel upgrades fix yesterday's local root exploit.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
  (* Security fix *)
patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
  (* Security fix *)
patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz:
  (* Security fix *)
patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
  (* Security fix *)
If you use lilo, don't forget to run it again after the upgrade.
+--------------------------+


Where to find the new packages:
+-----------------------------+

HINT:  Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try.  This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
The kernel patch used for the Slackware 12.0 Linux 2.6.21.5 kernel may be found here:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/source/kernel-source/splice.c.diff.gz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-2.6.23.16-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-smp-2.6.23.16_smp-i686-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-2.6.23.16-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-smp-2.6.23.16_smp-i686-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-2.6.23.16-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-smp-2.6.23.16_smp-i686-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/kernel-headers-2.6.23.16_smp-i386-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/k/kernel-source-2.6.23.16_smp-noarch-1.tgz


MD5 signatures:
+-------------+

Slackware 12.0 packages:
ebf025aa30af925ac6817fe58811e921  kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
e35c66f2d765a221b509f1b7b463c9fe  kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
3f9e3783dd7d799a277ec3e79e8bb82d  kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
0503193191731bba693ed6ce35b8c26d  kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz

Slackware -current packages:
ec7ac93d303037392d1257a26280a47d  kernel-generic-2.6.23.16-i486-1.tgz
51eb6a85e88f769165b8759a3b391ac9  kernel-generic-smp-2.6.23.16_smp-i686-1.tgz
14729d0653b4f613233ec9501a12fa15  kernel-huge-2.6.23.16-i486-1.tgz
50448f876c0285667902e8b93836ab4b  kernel-huge-smp-2.6.23.16_smp-i686-1.tgz
194c5c4b0743c4d611eb3de90c4b3015  kernel-modules-2.6.23.16-i486-1.tgz
fe7eb7e5e4f09353a88db9326fbcd9a9  kernel-modules-smp-2.6.23.16_smp-i686-1.tgz


Installation instructions:
+------------------------+

Upgrade the appropriate package as root:
# upgradepkg kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz

Then, if you use lilo rerun it to update the boot loader.


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHsOecakRjwEAQIjMRAr5pAJ9rkajzNsWTg8LTrtUbt+hQEdbgVQCeI+sh
JR1JuNml4YXSqJpOFA/iF3c=
=DJPk
-----END PGP SIGNATURE-----

Slackware™ is a trademark of Patrick Volkerding.