Slackware alert: 2.4.21 kernels available (SSA:2003-168-01)

Posted by dave on Jun 17, 2003 9:01 PM EDT
Mailing list
Mail this story
Print this story

Precompiled Linux 2.4.21 kernels and source packages are now available for Slackware 9.0 and -current. These provide an improved version of the ptrace fix that had been applied to 2.4.20 in Slackware 9.0 (for example, command line options now appear correctly when root does 'ps ax'), and fix a potential denial of service problem with netfilter.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] 2.4.21 kernels available (SSA:2003-168-01)

Precompiled Linux 2.4.21 kernels and source packages are now available for Slackware 9.0 and -current. These provide an improved version of the ptrace fix that had been applied to 2.4.20 in Slackware 9.0 (for example, command line options now appear correctly when root does 'ps ax'), and fix a potential denial of service problem with netfilter.

Here are the details from the Slackware 9.0 ChangeLog: +--------------------------+ Tue Jun 17 19:41:55 PDT 2003 New precompiled Linux 2.4.21 kernels and source packages are now available for Slackware 9.0. These fix a few problems with the ptrace patch used with the 2.4.20 kernel, and add a few extra drivers (like Silicon Image Serial-ATA support). The new kernel also fixes a number of security issues, such as a routing cache problem in 2.4.20 and earlier can allow an attacker to cause hash collisions in the prerouting chain that consume CPU resources resulting in a denial-of-service (CAN-2003-0244). patches/packages/kernel-headers-2.4.21-i386-1.tgz: Upgraded to Linux 2.4.21 kernel headers. patches/packages/kernel-ide-2.4.21-i486-1.tgz: Upgraded to Linux 2.4.21. patches/packages/kernel-modules-2.4.21-i486-1.tgz: Upgraded kernel modules to Linux 2.4.21. patches/packages/kernel-modules-2.4.21_xfs-i486-1.tgz: Upgraded the XFS-patched kernel modules package to Linux 2.4.21-xfs. These are needed for the xfs.i kernel. patches/packages/kernel-source-2.4.21-noarch-1.tgz: Upgraded to Linux 2.4.21 source. patches/kernels/*: Upgraded to Linux 2.4.21. (* Security fix *) +--------------------------+



WHERE TO FIND THE NEW PACKAGES: +-----------------------------+

Updated packages for Slackware 9.0: ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-headers-2.4.21-i386-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-ide-2.4.21-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-modules-2.4.21-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-modules-2.4.21_xfs-i486-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernel-source-2.4.21-noarch-1.tgz ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/kernels/



INSTALLATION INSTRUCTIONS: +------------------------+

If you are using the standard Slackware "bare.i" kernel, you may update your kernel like this:

upgradepkg kernel-ide-2.4.21-i486-1.tgz kernel-modules-2.4.21-i486-1.tgz

Then, reinstall your boot loader. This may be as simple as running 'lilo' as root, or you may use 'makebootdisk' to create a new boot floppy.

If you use a different kernel, you'll want to use upgradepkg to update the appropriate kernel modules package (kernel-modules-2.4.21-i486-1.tgz for most kernels, but if you use the xfs.i kernel with XFS patches, then you will need to use the kernel-modules-2.4.21_xfs-i486-1.tgz package instead). Then, install the kernel from the kernels/ directory. For example, to install the adaptec.s kernel: cd kernels/adaptec.s rm -f /boot/System.map /boot/config /boot/vmlinuz cp -a System.map.gz config bzImage /boot gzip -d /boot/System.map.gz mv /boot/bzImage /boot/vmlinuz Then, reinstall your boot loader.

You may also wish to update your installed kernel sources:

upgradepkg kernel-headers-2.4.21-i386-1.tgz kernel-source-2.4.21-noarch-1.tgz

If you use XFS or Speakup you'll need to apply additional patches found here:

ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/source/kernel-source/

+-----+

Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com

+------------------------------------------------------------------------+ | HOW TO REMOVE YOURSELF FROM THIS MAILING LIST: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back. Follow the instructions to | | complete the unsubscription. Do not reply to this message to | | unsubscribe! | +------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE+7+ngakRjwEAQIjMRAjmHAJ0W/OveAagvONs5G8D4NgU6OMiaIQCfZ1c1 xg1VN5lwafyHr0ujwPfHbLk= =5U48 -----END PGP SIGNATURE-----

  Nav
» Read more about: Story Type: Security; Groups: Slackware

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.