exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Slackware Security Advisory - Slackware 14.0 kernel Updates

Slackware Security Advisory - Slackware 14.0 kernel Updates
Posted Jul 3, 2017
Authored by Slackware Security Team | Site slackware.com

Slackware Security Advisory - New kernel packages are available for Slackware 14.0 to fix security issues.

tags | advisory, kernel
systems | linux, slackware
advisories | CVE-2017-1000364, CVE-2017-7482
SHA-256 | c28dd79c747d59ab4d92a0036b9acc8cf1fdee8759a0c01bd3bbd4940709cf92

Slackware Security Advisory - Slackware 14.0 kernel Updates

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] Slackware 14.0 kernel (SSA:2017-184-01)

New kernel packages are available for Slackware 14.0 to fix security issues.


Here are the details from the Slackware 14.0 ChangeLog:
+--------------------------+
patches/packages/linux-3.2.90/*: Upgraded.
This kernel fixes security issues (including "Stack Clash"). The issues
may result in denial-of-service conditions or may allow attackers to
execute arbitrary code with elevated privileges.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
For more information, see:
https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7482
(* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-generic-3.2.90-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-generic-smp-3.2.90_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-headers-3.2.90_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-huge-3.2.90-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-huge-smp-3.2.90_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-modules-3.2.90-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-modules-smp-3.2.90_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/linux-3.2.90/kernel-source-3.2.90_smp-noarch-1.txz

Updated packages for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/linux-3.2.90/kernel-generic-3.2.90-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/linux-3.2.90/kernel-headers-3.2.90-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/linux-3.2.90/kernel-huge-3.2.90-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/linux-3.2.90/kernel-modules-3.2.90-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/linux-3.2.90/kernel-source-3.2.90-noarch-1.txz


MD5 signatures:
+-------------+

Slackware 14.0 packages:
70df9be1b86779b3cc8cb52153bcfa84 kernel-generic-3.2.90-i586-1.txz
490eca2bc1b902928db2ea27034875c5 kernel-generic-smp-3.2.90_smp-i686-1.txz
2e3abf6947d3ee498479a5c537f146a8 kernel-headers-3.2.90_smp-x86-1.txz
3772fb2dcd8bde3e7aefdccc52786db9 kernel-huge-3.2.90-i586-1.txz
e9822b8634ce67b45e966ab6c921441c kernel-huge-smp-3.2.90_smp-i686-1.txz
86ff0c0eb55130e78ed930f0c047c815 kernel-modules-3.2.90-i586-1.txz
30a1a39bd010ef4ca7dcb0677f03c96c kernel-modules-smp-3.2.90_smp-i686-1.txz
a0ff0db6d253eb638583bea6f8e767eb kernel-source-3.2.90_smp-noarch-1.txz

Slackware x86_64 14.0 packages:
40a114d1e988d8f1e17f7a8093ac05d0 kernel-generic-3.2.90-x86_64-1.txz
6996ae73c43375b42c0d88c8af82a57e kernel-headers-3.2.90-x86-1.txz
62bc6f0a5d15baac4e980669e31dd938 kernel-huge-3.2.90-x86_64-1.txz
5ef252a764f9f0bec37cc3dea0e1baa8 kernel-modules-3.2.90-x86_64-1.txz
24fb56c90034af5718ee46adb8bff8ff kernel-source-3.2.90-noarch-1.txz


Installation instructions:
+------------------------+

Upgrade the packages as root:
# upgradepkg kernel-*.txz

If you are using an initrd, you'll need to rebuild it.

For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 3.2.90-smp | bash

For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 3.2.90 | bash

Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren't sure which
kernel you are running, run "uname -a". If you see SMP there, you are
running the SMP kernel and should use the 3.2.90-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit
systems should always use 3.2.90 as the version.

If you are using lilo to boot the machine, you'll need to ensure that the
machine is properly prepared before rebooting. Be sure that the image= line
references the correct kernel file and then run "lilo" as root to reinstall
the boot loader.


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address. |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----

iEYEARECAAYFAllayvQACgkQakRjwEAQIjOhnQCfbqFZM3mdWpsyVKgxBCtVO6sS
xS8AnAyAmT3TONyhb2qgX3EUYB+wP/8K
=U/jH
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

March 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Mar 1st
    16 Files
  • 2
    Mar 2nd
    0 Files
  • 3
    Mar 3rd
    0 Files
  • 4
    Mar 4th
    32 Files
  • 5
    Mar 5th
    28 Files
  • 6
    Mar 6th
    42 Files
  • 7
    Mar 7th
    17 Files
  • 8
    Mar 8th
    13 Files
  • 9
    Mar 9th
    0 Files
  • 10
    Mar 10th
    0 Files
  • 11
    Mar 11th
    15 Files
  • 12
    Mar 12th
    19 Files
  • 13
    Mar 13th
    21 Files
  • 14
    Mar 14th
    38 Files
  • 15
    Mar 15th
    15 Files
  • 16
    Mar 16th
    0 Files
  • 17
    Mar 17th
    0 Files
  • 18
    Mar 18th
    10 Files
  • 19
    Mar 19th
    32 Files
  • 20
    Mar 20th
    46 Files
  • 21
    Mar 21st
    16 Files
  • 22
    Mar 22nd
    13 Files
  • 23
    Mar 23rd
    0 Files
  • 24
    Mar 24th
    0 Files
  • 25
    Mar 25th
    12 Files
  • 26
    Mar 26th
    31 Files
  • 27
    Mar 27th
    19 Files
  • 28
    Mar 28th
    42 Files
  • 29
    Mar 29th
    0 Files
  • 30
    Mar 30th
    0 Files
  • 31
    Mar 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close