Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme im Kernel
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme im Kernel
ID: SSA:2008-042-01
Distribution: Slackware
Plattformen: Slackware -current, Slackware 12.0
Datum: Di, 12. Februar 2008, 23:02
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
Applikationen: Linux

Originalnachricht


An unusually large number of people reported that they didn't get this
advisory, so here's another try. Sorry if it's a dupe, or if you
don't
get this one either. We've been working on the mail server and it's
possible that something got misconfigured. If so, sorry about that.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] kernel exploit fix (SSA:2008-042-01)

New kernel packages are available for Slackware 12.0, and -current to
fix a local root exploit.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600


Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz:
All of these kernel upgrades fix yesterday's local root exploit.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
(* Security fix *)
patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
(* Security fix *)
patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz:
(* Security fix *)
patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
(* Security fix *)
If you use lilo, don't forget to run it again after the upgrade.
+--------------------------+


Where to find the new packages:
+-----------------------------+

HINT: Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try. This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 12.0:
kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
The kernel patch used for the Slackware 12.0 Linux 2.6.21.5 kernel may be found
here:
splice.c.diff.gz

Updated packages for Slackware -current:
kernel-generic-2.6.23.16-i486-1.tgz
kernel-generic-smp-2.6.23.16_smp-i686-1.tgz
kernel-huge-2.6.23.16-i486-1.tgz
kernel-huge-smp-2.6.23.16_smp-i686-1.tgz
kernel-modules-2.6.23.16-i486-1.tgz
kernel-modules-smp-2.6.23.16_smp-i686-1.tgz
kernel-headers-2.6.23.16_smp-i386-1.tgz
kernel-source-2.6.23.16_smp-noarch-1.tgz


MD5 signatures:
+-------------+

Slackware 12.0 packages:
ebf025aa30af925ac6817fe58811e921 kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
e35c66f2d765a221b509f1b7b463c9fe
kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
3f9e3783dd7d799a277ec3e79e8bb82d kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
0503193191731bba693ed6ce35b8c26d
kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz

Slackware -current packages:
ec7ac93d303037392d1257a26280a47d kernel-generic-2.6.23.16-i486-1.tgz
51eb6a85e88f769165b8759a3b391ac9 kernel-generic-smp-2.6.23.16_smp-i686-1.tgz
14729d0653b4f613233ec9501a12fa15 kernel-huge-2.6.23.16-i486-1.tgz
50448f876c0285667902e8b93836ab4b kernel-huge-smp-2.6.23.16_smp-i686-1.tgz
194c5c4b0743c4d611eb3de90c4b3015 kernel-modules-2.6.23.16-i486-1.tgz
fe7eb7e5e4f09353a88db9326fbcd9a9 kernel-modules-smp-2.6.23.16_smp-i686-1.tgz


Installation instructions:
+------------------------+

Upgrade the appropriate package as root:
# upgradepkg kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz

Then, if you use lilo rerun it to update the boot loader.


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFHsOecakRjwEAQIjMRAr5pAJ9rkajzNsWTg8LTrtUbt+hQEdbgVQCeI+sh
JR1JuNml4YXSqJpOFA/iF3c=
=DJPk
-----END PGP SIGNATURE-----
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung