what you don't know can hurt you

Slackware Security Advisory - kernel Updates

Slackware Security Advisory - kernel Updates
Posted May 21, 2013
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New Linux kernel packages are available for Slackware 13.37 and 14.0 to fix a security issue.

tags | advisory, kernel
systems | linux, slackware
advisories | CVE-2013-2094
MD5 | e50f438e4b40cbc8413dc87b5c6904bb

Slackware Security Advisory - kernel Updates

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] kernel (SSA:2013-140-01)

New Linux kernel packages are available for Slackware 13.37 and 14.0 to fix
a security issue.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/linux-3.2.45/*: Upgraded.
Upgraded to new kernels that fix CVE-2013-2094, a bug that can allow local
users to gain a root shell. Be sure to upgrade your initrd and reinstall
LILO after upgrading the kernel packages.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/linux-2.6.37.6-3/

Updated packages for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/linux-2.6.37.6-3/

Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.45/

Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/linux-3.2.45/


MD5 signatures:
+-------------+

Slackware 13.37 packages:
99b5d3961b5be56497cd53510a9572ff kernel-firmware-20130512git-noarch-1.txz
de925c472fb6c330eead07a3e767b65a kernel-generic-2.6.37.6-i486-3.txz
d2f771b44accf311737c776fb5704805 kernel-generic-smp-2.6.37.6_smp-i686-3.txz
9d0b7d34403e2a6a2e4936b7095b8e47 kernel-headers-2.6.37.6_smp-x86-3.txz
30f60d09d7b1690ab314db56d6d65df5 kernel-huge-2.6.37.6-i486-3.txz
9184cfc5b40d882336b443aef1897029 kernel-huge-smp-2.6.37.6_smp-i686-3.txz
0b3644301f1404a0cdcc76f6adffeaf6 kernel-modules-2.6.37.6-i486-3.txz
c130f273b9a2aa8cd54a3167ffa48aec kernel-modules-smp-2.6.37.6_smp-i686-3.txz
c4fb8b49f8cb8e4cc62c53ad2a0a4c00 kernel-source-2.6.37.6_smp-noarch-3.txz

Slackware x86_64 13.37 packages:
99b5d3961b5be56497cd53510a9572ff kernel-firmware-20130512git-noarch-1.txz
7efb7195c7d7dbc6ab3f40454670bc64 kernel-generic-2.6.37.6-x86_64-3.txz
e9f689a3ee6f1937c33d0c9ea20ac9ff kernel-headers-2.6.37.6-x86-3.txz
93bc2c1264a195e08ce9bb616832f29d kernel-huge-2.6.37.6-x86_64-3.txz
cc788fc70ae0204c54228c40bce1e8f6 kernel-modules-2.6.37.6-x86_64-3.txz
ed5bbc7fb55c1a4c8e34de5a7a9c43fc kernel-source-2.6.37.6-noarch-3.txz

Slackware 14.0 packages:
99b5d3961b5be56497cd53510a9572ff kernel-firmware-20130512git-noarch-1.txz
3e2a61b57a99907d99eb74e67ff57e0c kernel-generic-3.2.45-i486-1.txz
6fbd61f493081e0526254ed0b7f1f735 kernel-generic-smp-3.2.45_smp-i686-1.txz
3a3a54ba8c971b9b9f93551c97bb06d9 kernel-headers-3.2.45_smp-x86-1.txz
778ff709728bf92c3adf5c7cdaab4dd7 kernel-huge-3.2.45-i486-1.txz
b1416ff63c7d9b497292c2a9997bcd5c kernel-huge-smp-3.2.45_smp-i686-1.txz
39312f1bbffc432c236f03b35c74b790 kernel-modules-3.2.45-i486-1.txz
02927b33dfd01ccbb44f8276484802b1 kernel-modules-smp-3.2.45_smp-i686-1.txz
6a2a843660fd349fe88de23d8db017df kernel-source-3.2.45_smp-noarch-1.txz

Slackware x86_64 14.0 packages:
99b5d3961b5be56497cd53510a9572ff kernel-firmware-20130512git-noarch-1.txz
25804c3fc32f8dc4b8ba25c2de8f969e kernel-generic-3.2.45-x86_64-1.txz
6ea9ec608564408bad734d8610c695b0 kernel-headers-3.2.45-x86-1.txz
0b452f0c8ec46c4ce04fd2d9c78e7687 kernel-huge-3.2.45-x86_64-1.txz
eba43509f3118eb27c7b4e4918b87155 kernel-modules-3.2.45-x86_64-1.txz
43b0d8457ab00cdf1f46461676fc1d71 kernel-source-3.2.45-noarch-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg kernel-*.txz

On Slackware 14.0 systems the kernel version has changed, so you will need
to rebuild your initrd if you are using one.

For Slackware 64-14.0 use this command:
/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 3.2.45 | bash

For Slackware 14.0 (32-bit) SMP, use this command:
/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 3.2.45-smp | bash

For Slackware 14.0 (32-bit) uniprocessor, use this command:
/usr/share/mkinitrd/mkinitrd_command_generator.sh -k 3.2.45 | bash

Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel if they can
regardless of the number of cores the CPU has. If you aren't sure which
kernel you are running, run "uname -a". If you see SMP there, you are
running the SMP kernel and should use the 3.2.45-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit
systems should always use 3.2.45 as the version.

For all systems (13.37 and 14.0):

If needed, edit your /etc/lilo.conf to adjust the version number on the
"image =" line. By default this will not have a version number and will
just follow the /boot/vmlinuz symlink, but you might need to make this
change if you've edited your lilo.conf manually.

Then, run "lilo" to reinstall the boot loader.

If there are no errors from LILO, reboot the system to begin using the
new kernel.


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlGak+sACgkQakRjwEAQIjPxYACghnmJITE+NCaIdNCpaYvVRaKq
cqEAnjv5RGVV5+OyeF7ecnZZWgEU02r1
=pHXI
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    15 Files
  • 2
    Jul 2nd
    19 Files
  • 3
    Jul 3rd
    12 Files
  • 4
    Jul 4th
    1 Files
  • 5
    Jul 5th
    2 Files
  • 6
    Jul 6th
    25 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    0 Files
  • 9
    Jul 9th
    0 Files
  • 10
    Jul 10th
    0 Files
  • 11
    Jul 11th
    0 Files
  • 12
    Jul 12th
    0 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close