Slackware Security Announcement: 2009-342-01 kernel

53

[slackware-security] kernel (SSA:2009-342-01)

 

New Linux kernel packages are available for Slackware 13.0 and -current

to address a security issue. A kernel bug discovered by David Ford may

allow remote attackers to crash the kernel by sending an oversized IP

packet. While the impact on ordinary servers is still unclear (the

problem was noticed while running openvasd), we are issuing these kernel

packages as a preemptive measure.

 

For more information, see:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1298

http://lkml.org/lkml/2009/11/25/104

 

 

Here are the details from the Slackware 13.0 ChangeLog:

+————————–+

Tue Dec 8 20:44:44 UTC 2009

patches/packages/linux-2.6.29.6-3/:

Added new kernels and kernel packages with a patch for CVE-2009-1298,

a kernel bug where oversized IP packets cause a NULL pointer dereference

and immediate hang.

For more information, see:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1298

http://lkml.org/lkml/2009/11/25/104

Be sure to reinstall LILO after upgrading the kernel packages.

(* Security fix *)

+————————–+

 

 

Where to find the new packages:

+—————————–+

 

HINT: Getting slow download speeds from ftp.slackware.com?

Give slackware.osuosl.org a try. This is another primary FTP site

for Slackware that can be considerably faster than downloading

directly from ftp.slackware.com.

 

Thanks to the friendly folks at the OSU Open Source Lab

(http://osuosl.org) for donating additional FTP and rsync hosting

to the Slackware project! 🙂

 

Also see the “Get Slack” section on http://slackware.com for

additional mirror sites near you.

 

Updated kernel packages for Slackware 13.0 may be found here:

ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/linux-2.6.29.6-3/

 

Updated kernel packages for Slackware 13.0 x86_64 may be found here:

ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/linux-2.6.29.6-3/

 

Updated kernel packages for Slackware -current may be found here:

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-firmware-2.6.29.6-noarch-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-2.6.29.6-i486-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-generic-smp-2.6.29.6_smp-i686-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-2.6.29.6-i486-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-huge-smp-2.6.29.6_smp-i686-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-2.6.29.6-i486-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/kernel-modules-smp-2.6.29.6_smp-i686-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/d/kernel-headers-2.6.29.6_smp-x86-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/k/kernel-source-2.6.29.6_smp-noarch-3.txz

 

Updated kernel packages for Slackware -current x86_64 may be found here:

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-firmware-2.6.29.6-noarch-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-generic-2.6.29.6-x86_64-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-huge-2.6.29.6-x86_64-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/kernel-modules-2.6.29.6-x86_64-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/d/kernel-headers-2.6.29.6-x86-3.txz

ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/k/kernel-source-2.6.29.6-noarch-3.txz

 

 

Signatures:

+———+

 

All packages are signed with the Slackware Security Team GPG signature for

verification of authenticity. File may also be checked with the CHECKSUMS.md5

file provided in each Slackware directory tree, which is also signed with the

Slackware GPG key.

 

 

Kernel patch for Linux 2.6.29.x or newer:

+———————————————+

 

A kernel patch for CVE-2009-1298 that should apply cleanly to most 2.6.29.x

or newer kernels may be found here:

 

ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/source/linux-2.6.29.6-3/linux-2.6.29.6-03-ip_fragment-CVE-2009-1298.diff.gz

 

 

Installation instructions:

+————————+

 

Upgrade the kernel packages as root and reinstall LILO.

 

If you are building your own kernel from unfixed vanilla sources,

the patch(es) appropriate for your kernel may be applied to the source

like this:

 

cd /usr/src/linux

zcat linux-2.6.29.6-03-ip_fragment-CVE-2009-1298.diff.gz | patch -p1 –verbose

 

Note that the previous security patches should also be applied if using

unfixed 2.6.29.6 sources. Those are also available in the same directory

on the FTP server.

 

 

+—–+

 

Slackware Linux Security Team

http://slackware.com/gpg-key

This e-mail address is being protected from spambots. You need JavaScript enabled to view it