Mehrere Probleme im Kernel
ID: | SSA:2008-042-01 |
Distribution: | Slackware |
Plattformen: | Slackware -current, Slackware 12.0 |
Datum: | Di, 12. Februar 2008, 05:42 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600 |
Applikationen: | Linux |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] kernel exploit fix (SSA:2008-042-01) New kernel packages are available for Slackware 12.0, and -current to fix a local root exploit. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600 Here are the details from the Slackware 12.0 ChangeLog: +--------------------------+ patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz: All of these kernel upgrades fix yesterday's local root exploit. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600 (* Security fix *) patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz: (* Security fix *) patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz: (* Security fix *) patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz: (* Security fix *) If you use lilo, don't forget to run it again after the upgrade. +--------------------------+ Where to find the new packages: +-----------------------------+ HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading directly from ftp.slackware.com. Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating additional FTP and rsync hosting to the Slackware project! :-) Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you. Updated packages for Slackware 12.0: ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz The kernel patch used for the Slackware 12.0 Linux 2.6.21.5 kernel may be found here: ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/source/kernel-source/splice.c.diff.gz Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-2.6.23.16-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-smp-2.6.23.16_smp-i686-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-2.6.23.16-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-smp-2.6.23.16_smp-i686-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-2.6.23.16-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-smp-2.6.23.16_smp-i686-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/kernel-headers-2.6.23.16_smp-i386-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/k/kernel-source-2.6.23.16_smp-noarch-1.tgz MD5 signatures: +-------------+ Slackware 12.0 packages: ebf025aa30af925ac6817fe58811e921 kernel-generic-2.6.21.5-i486-2_slack12.0.tgz e35c66f2d765a221b509f1b7b463c9fe kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz 3f9e3783dd7d799a277ec3e79e8bb82d kernel-huge-2.6.21.5-i486-2_slack12.0.tgz 0503193191731bba693ed6ce35b8c26d kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz Slackware -current packages: ec7ac93d303037392d1257a26280a47d kernel-generic-2.6.23.16-i486-1.tgz 51eb6a85e88f769165b8759a3b391ac9 kernel-generic-smp-2.6.23.16_smp-i686-1.tgz 14729d0653b4f613233ec9501a12fa15 kernel-huge-2.6.23.16-i486-1.tgz 50448f876c0285667902e8b93836ab4b kernel-huge-smp-2.6.23.16_smp-i686-1.tgz 194c5c4b0743c4d611eb3de90c4b3015 kernel-modules-2.6.23.16-i486-1.tgz fe7eb7e5e4f09353a88db9326fbcd9a9 kernel-modules-smp-2.6.23.16_smp-i686-1.tgz Installation instructions: +------------------------+ Upgrade the appropriate package as root: # upgradepkg kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz Then, if you use lilo rerun it to update the boot loader. +-----+ Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com +------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address. | +------------------------------------------------------------------------+ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux) iD8DBQFHsOecakRjwEAQIjMRAr5pAJ9rkajzNsWTg8LTrtUbt+hQEdbgVQCeI+sh JR1JuNml4YXSqJpOFA/iF3c= =DJPk -----END PGP SIGNATURE----- |