[bglug] Fw: [slackware-security] 2.4.21 kernels available (SSA:2003-168-01)

k|b|s kbs@bglug.it
Mer 18 Giu 2003 10:36:52 CEST


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1



Begin forwarded message:

Date: Tue, 17 Jun 2003 22:01:21 -0700 (PDT)
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security]  2.4.21 kernels available
(SSA:2003-168-01)



- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  2.4.21 kernels available (SSA:2003-168-01)

Precompiled Linux 2.4.21 kernels and source packages are now available
for
Slackware 9.0 and -current.  These provide an improved version of the
ptrace fix that had been applied to 2.4.20 in Slackware 9.0 (for
example,
command line options now appear correctly when root does 'ps ax'), and
fix a potential denial of service problem with netfilter.

Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Tue Jun 17 19:41:55 PDT 2003
New precompiled Linux 2.4.21 kernels and source packages are now
available
  for Slackware 9.0.  These fix a few problems with the ptrace patch
used
  with the 2.4.20 kernel, and add a few extra drivers (like Silicon
Image
  Serial-ATA support).  The new kernel also fixes a number of security
  issues, such as a routing cache problem in 2.4.20 and earlier can
allow
  an attacker to cause hash collisions in the prerouting chain that
consume
  CPU resources resulting in a denial-of-service (CAN-2003-0244).
patches/packages/kernel-headers-2.4.21-i386-1.tgz:  Upgraded to Linux
  2.4.21 kernel headers.
patches/packages/kernel-ide-2.4.21-i486-1.tgz:  Upgraded to Linux
2.4.21.
patches/packages/kernel-modules-2.4.21-i486-1.tgz:  Upgraded kernel
modules
  to Linux 2.4.21.
patches/packages/kernel-modules-2.4.21_xfs-i486-1.tgz:  Upgraded the
  XFS-patched kernel modules package to Linux 2.4.21-xfs.  These are
needed
  for the xfs.i kernel.
patches/packages/kernel-source-2.4.21-noarch-1.tgz:  Upgraded to Linux
  2.4.21 source.
patches/kernels/*:  Upgraded to Linux 2.4.21.
(* Security fix *)
+--------------------------+



WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated packages for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-headers-2.4.21-i386-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-ide-2.4.21-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-modules-2.4.21-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-modules-2.4.21_xfs-i486-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-source-2.4.21-noarch-1.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernels/



INSTALLATION INSTRUCTIONS:
+------------------------+

If you are using the standard Slackware "bare.i" kernel, you may update
your kernel like this:

upgradepkg kernel-ide-2.4.21-i486-1.tgz kernel-modules-2.4.21-i486-1.tgz

Then, reinstall your boot loader.  This may be as simple as running
'lilo'
as root, or you may use 'makebootdisk' to create a new boot floppy.

If you use a different kernel, you'll want to use upgradepkg to update
the
appropriate kernel modules package (kernel-modules-2.4.21-i486-1.tgz for
most kernels, but if you use the xfs.i kernel with XFS patches, then you
will need to use the kernel-modules-2.4.21_xfs-i486-1.tgz package
instead).
Then, install the kernel from the kernels/ directory.  For example, to
install the adaptec.s kernel:
  cd kernels/adaptec.s
  rm -f /boot/System.map /boot/config /boot/vmlinuz
  cp -a System.map.gz config bzImage /boot
  gzip -d /boot/System.map.gz
  mv /boot/bzImage /boot/vmlinuz
Then, reinstall your boot loader.

You may also wish to update your installed kernel sources:

upgradepkg kernel-headers-2.4.21-i386-1.tgz
kernel-source-2.4.21-noarch-1.tgz

If you use XFS or Speakup you'll need to apply additional patches found
here:

ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/source/kernel-source/


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+----------------------------------------------------------------------
- --+
| HOW TO REMOVE YOURSELF FROM THIS MAILING LIST:                        
|
+----------------------------------------------------------------------
- --+
| Send an email to majordomo@slackware.com with this text in the body of
|
| the email message:                                                    
|
|                                                                       
|
|   unsubscribe slackware-security                                      
|
|                                                                       
|
| You will get a confirmation message back.  Follow the instructions to 
|
| complete the unsubscription.  Do not reply to this message to         
|
| unsubscribe!                                                          
|
+----------------------------------------------------------------------
- --+

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+7+ngakRjwEAQIjMRAjmHAJ0W/OveAagvONs5G8D4NgU6OMiaIQCfZ1c1
xg1VN5lwafyHr0ujwPfHbLk=
=5U48
- -----END PGP SIGNATURE-----


- -- 
* k|b|s * mailto `echo ti.gulgb@sbk|'rev'`

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (MingW32)

iEYEARECAAYFAj7wFpQACgkQPJE4D78UP9NjFwCgjr7jCGmJTWoYunbtOllni8ha
rSEAn2TxLBEqfbJBofTKUWNrC0Bg4Dgu
=x/F/
-----END PGP SIGNATURE-----


Maggiori informazioni sulla lista bglug