Slackware Security Advisories
Slackware Logo

News

Security Advisories

FAQ

Book

General Info

Get Slack

Install Help

Configuration

Packages

ChangeLogs

Propaganda

Ports

Other Sites

Support

Contact

Mailing Lists

About

 
From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] kernel (SSA:2009-342-01)
Date: Tue, 8 Dec 2009 14:41:02 -0800 (PST)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  kernel (SSA:2009-342-01)

New Linux kernel packages are available for Slackware 13.0 and -current
to address a security issue.  A kernel bug discovered by David Ford may
allow remote attackers to crash the kernel by sending an oversized IP
packet.  While the impact on ordinary servers is still unclear (the
problem was noticed while running openvasd), we are issuing these kernel
packages as a preemptive measure.

For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1298
    http://lkml.org/lkml/2009/11/25/104


Here are the details from the Slackware 13.0 ChangeLog:
+--------------------------+
Tue Dec  8 20:44:44 UTC 2009
patches/packages/linux-2.6.29.6-3/:
  Added new kernels and kernel packages with a patch for CVE-2009-1298,
  a kernel bug where oversized IP packets cause a NULL pointer dereference
  and immediate hang.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1298
    http://lkml.org/lkml/2009/11/25/104
  Be sure to reinstall LILO after upgrading the kernel packages.
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

HINT:  Getting slow download speeds from ftp.slackware.com?
Give slackware.osuosl.org a try.  This is another primary FTP site
for Slackware that can be considerably faster than downloading
directly from ftp.slackware.com.

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating additional FTP and rsync hosting
to the Slackware project!  :-)

Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.

Updated kernel packages for Slackware 13.0 may be found here:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/linux-2.6.29.6-3/

Updated kernel packages for Slackware 13.0 x86_64 may be found here:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/linux-2.6.29.6-3/

Updated kernel packages for Slackware -current may be found here:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-firmware-2.6.29.6-noarch-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-2.6.29.6-i486-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-smp-2.6.29.6_smp-i686-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-2.6.29.6-i486-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-smp-2.6.29.6_smp-i686-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-2.6.29.6-i486-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-smp-2.6.29.6_smp-i686-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/kernel-headers-2.6.29.6_smp-x86-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/k/kernel-source-2.6.29.6_smp-noarch-3.txz

Updated kernel packages for Slackware -current x86_64 may be found here:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-firmware-2.6.29.6-noarch-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-generic-2.6.29.6-x86_64-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-huge-2.6.29.6-x86_64-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-modules-2.6.29.6-x86_64-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/kernel-headers-2.6.29.6-x86-3.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/k/kernel-source-2.6.29.6-noarch-3.txz


Signatures:
+---------+

All packages are signed with the Slackware Security Team GPG signature for
verification of authenticity.  File may also be checked with the CHECKSUMS.md5
file provided in each Slackware directory tree, which is also signed with the
Slackware GPG key.


Kernel patch for Linux 2.6.29.x or newer:
+---------------------------------------------+

A kernel patch for CVE-2009-1298 that should apply cleanly to most 2.6.29.x
or newer kernels may be found here:

ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/source/linux-2.6.29.6-3/linux-2.6.29.6-03-ip_fragment-CVE-2009-1298.diff.gz


Installation instructions:
+------------------------+

Upgrade the kernel packages as root and reinstall LILO.

If you are building your own kernel from unfixed vanilla sources,
the patch(es) appropriate for your kernel may be applied to the source
like this:

cd /usr/src/linux
zcat linux-2.6.29.6-03-ip_fragment-CVE-2009-1298.diff.gz | patch -p1 --verbose

Note that the previous security patches should also be applied if using
unfixed 2.6.29.6 sources.  Those are also available in the same directory
on the FTP server.


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAksexEYACgkQakRjwEAQIjPh8ACeOaBz+alO45bwHyk6JCcfJUpH
r2IAn3jv+i05FJiUXPkkSNT+f1kKHnVf
=5ddy
-----END PGP SIGNATURE-----

Slackware® is a registered trademark of Slackware Linux, Inc. All logos and graphics are copyrighted.