An unusually large number of people reported that they didn't get this 
advisory, so here's another try.  Sorry if it's a dupe, or if you don't 
get this one either.  We've been working on the mail server and it's 
possible that something got misconfigured.  If so, sorry about that.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  kernel exploit fix (SSA:2008-042-01)

New kernel packages are available for Slackware 12.0, and -current to
fix a local root exploit.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600


Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz:
  All of these kernel upgrades fix yesterday's local root exploit.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600
  (* Security fix *)
patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
  (* Security fix *)
patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz:
  (* Security fix *)
patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz:
  (* Security fix *)
If you use lilo, don't forget to run it again after the upgrade.
+--------------------------+


Where to find the new packages:
+-----------------------------+

HINT:  Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try.  This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(https://osuosl.org/) for donating additional FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://www.slackware.com/ for
additional mirror sites near you.

Updated packages for Slackware 12.0:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
The kernel patch used for the Slackware 12.0 Linux 2.6.21.5 kernel may be found here:
ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/source/kernel-source/splice.c.diff.gz

Updated packages for Slackware -current:


MD5 signatures:
+-------------+

Slackware 12.0 packages:
ebf025aa30af925ac6817fe58811e921  kernel-generic-2.6.21.5-i486-2_slack12.0.tgz
e35c66f2d765a221b509f1b7b463c9fe  kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
3f9e3783dd7d799a277ec3e79e8bb82d  kernel-huge-2.6.21.5-i486-2_slack12.0.tgz
0503193191731bba693ed6ce35b8c26d  kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz

Slackware -current packages:
ec7ac93d303037392d1257a26280a47d  kernel-generic-2.6.23.16-i486-1.tgz
51eb6a85e88f769165b8759a3b391ac9  kernel-generic-smp-2.6.23.16_smp-i686-1.tgz
14729d0653b4f613233ec9501a12fa15  kernel-huge-2.6.23.16-i486-1.tgz
50448f876c0285667902e8b93836ab4b  kernel-huge-smp-2.6.23.16_smp-i686-1.tgz
194c5c4b0743c4d611eb3de90c4b3015  kernel-modules-2.6.23.16-i486-1.tgz
fe7eb7e5e4f09353a88db9326fbcd9a9  kernel-modules-smp-2.6.23.16_smp-i686-1.tgz


Installation instructions:
+------------------------+

Upgrade the appropriate package as root:
# upgradepkg kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz

Then, if you use lilo rerun it to update the boot loader.


+-----+

Slackware: 2008-042-01: kernel exploit fix Security Update

February 12, 2008
New kernel packages are available for Slackware 12.0, and -current to fix a local root exploit

Summary

Here are the details from the Slackware 12.0 ChangeLog: patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz: All of these kernel upgrades fix yesterday's local root exploit. For more information, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600 (* Security fix *) patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz: (* Security fix *) patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz: (* Security fix *) patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz: (* Security fix *) If you use lilo, don't forget to run it again after the upgrade.

Where Find New Packages

HINT: Getting slow download speeds from ftp.slackware.com? Give slackware.osuosl.org a try. This is another primary FTP site for Slackware that can be considerably faster than downloading directly from ftp.slackware.com.
Thanks to the friendly folks at the OSU Open Source Lab (https://osuosl.org/) for donating additional FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://www.slackware.com/ for additional mirror sites near you.
Updated packages for Slackware 12.0: ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-2.6.21.5-i486-2_slack12.0.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-2.6.21.5-i486-2_slack12.0.tgz ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/packages/kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz The kernel patch used for the Slackware 12.0 Linux 2.6.21.5 kernel may be found here: ftp://ftp.slackware.com/pub/slackware/slackware-12.0/patches/source/kernel-source/splice.c.diff.gz
Updated packages for Slackware -current:

MD5 Signatures

Slackware 12.0 packages: ebf025aa30af925ac6817fe58811e921 kernel-generic-2.6.21.5-i486-2_slack12.0.tgz e35c66f2d765a221b509f1b7b463c9fe kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz 3f9e3783dd7d799a277ec3e79e8bb82d kernel-huge-2.6.21.5-i486-2_slack12.0.tgz 0503193191731bba693ed6ce35b8c26d kernel-huge-smp-2.6.21.5_smp-i686-2_slack12.0.tgz
Slackware -current packages: ec7ac93d303037392d1257a26280a47d kernel-generic-2.6.23.16-i486-1.tgz 51eb6a85e88f769165b8759a3b391ac9 kernel-generic-smp-2.6.23.16_smp-i686-1.tgz 14729d0653b4f613233ec9501a12fa15 kernel-huge-2.6.23.16-i486-1.tgz 50448f876c0285667902e8b93836ab4b kernel-huge-smp-2.6.23.16_smp-i686-1.tgz 194c5c4b0743c4d611eb3de90c4b3015 kernel-modules-2.6.23.16-i486-1.tgz fe7eb7e5e4f09353a88db9326fbcd9a9 kernel-modules-smp-2.6.23.16_smp-i686-1.tgz

Severity
An unusually large number of people reported that they didn't get this advisory, so here's another try. Sorry if it's a dupe, or if you don't get this one either. We've been working on the mail server and it's possible that something got misconfigured. If so, sorry about that.
[slackware-security] kernel exploit fix (SSA:2008-042-01)
New kernel packages are available for Slackware 12.0, and -current to fix a local root exploit.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0010 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0600

Installation Instructions

Installation instructions: Upgrade the appropriate package as root: # upgradepkg kernel-generic-smp-2.6.21.5_smp-i686-2_slack12.0.tgz Then, if you use lilo rerun it to update the boot loader.

Related News