ALT Linux Community general discussions
 help / color / mirror / Atom feed
From: vserge <vserge@menatepspb.msk.ru>
To: "mandrake-russian@altlinux.ru" <mandrake-russian@altlinux.ru>
Subject: [mdk-re] [Fwd: MDKSA-2001:037 - kernel update] и как это рассматривать
Date: Wed Apr 18 14:07:53 2001
Message-ID: <3ADD67AC.AD5C5DF9@menatepspb.msk.ru> (raw)


-------- Original Message --------
Subject: MDKSA-2001:037 - kernel update
Date: Tue, 17 Apr 2001 14:31:46 -0600
From: Linux Mandrake Security Team <security@LINUX-MANDRAKE.COM>
Reply-To: Linux Mandrake Security Team <security@LINUX-MANDRAKE.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                Linux-Mandrake Security Update Advisory
________________________________________________________________________

Package name:           kernel
Date:                   April 17th, 2001
Advisory ID:            MDKSA-2001:037

Affected versions:      6.0, 6.1, 7.0, 7.1, 7.2, Corporate Server 1.0.1
________________________________________________________________________

Problem Description:

 A number of security problems have been found in the Linux kernels
 prior to the latest 2.2.19 kernel.  Following is a list of problems
 based on the 2.2.19 release notes as found on http://www.linux.org.uk/

 - binfmt_misc used user pages directly
 - the CPIA driver had an off-by-one error in the buffer code which made
   it possible for users to write into kernel memory
 - the CPUID and MSR drivers had a problem in the module unloading code
   which could cause a system a crash if they were set to automatically
   load and unload
 - there was a possible hang in the classifier code
 - the getsockopt and setsockopt system calls did not handle sign bits
   correctly which made a local DoS and other attacks possible
 - the sysctl system call did not handle sign bits correctly which
   allowed a user to write in kernel memory
 - ptrace/exec races that could give a local user extra privileges
 - possible abuse of a boundary case in the sockfilter code
 - SYSV shared memory code could overwrite recently freed memory which
   might cause problems
 - the packet lengh checks in the masquerading code were a bit lax
   (probably not exploitable)
 - some x86 assembly bugs caused the wrong number of bytes to be copied
 - a local user could deadlock the kernel due to bugs in the UDP port
   allocation.

 All of these problems are corrected in the 2.2.19 kernel and it is
 highly recommended that all Linux-Mandrake users upgrade their systems
 to this kernel.

 It is also recommended that you download the necessary RPMs and upgrade
 manually by following these steps:

  - type: rpm -ivh kernel-2.2.19-4.1mdk.i586.rpm
  - type: mv kernel-2.2.19-4.1mdk.i586.rpm /tmp
  - type: rpm -Fvh *.rpm
  - type: mkinitrd -f --ifneeded /boot/initrd-2.2.19-4.1mdk
2.2.19-4.1mdk
  - type: ln -sf /boot/initrd-2.2.19-4.1mdk /boot/initrd.img
  - edit /etc/lilo.conf and double-check the options
  - type: /sbin/lilo -v

 Replace the kernel revision noted in the above instructions with those
 from the packages you downloaded.   You will then be able to reboot and
 use the new kernel and remove the older kernel when you are comfortable
 using the upgraded one.
________________________________________________________________________

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package.  You can do this with the command:
  rpm --checksig package.rpm
You can get the GPG public key of the Linux-Mandrake Security Team at
  http://www.linux-mandrake.com/en/security/RPM-GPG-KEYS
If you use MandrakeUpdate, the verification of md5 checksum and GPG
signature is performed automatically for you.

Linux-Mandrake 6.0:
58c4a19e37d0fe453333921652d2dd33  6.0/RPMS/kernel-2.2.19-4.6mdk.i586.rpm
c2c32fa328442f2afa3dae1184b92d70 
6.0/RPMS/kernel-doc-2.2.19-4.6mdk.i586.rpm
477b1caf8bb8bc906ef3f67c09a68e87 
6.0/RPMS/kernel-headers-2.2.19-4.6mdk.i586.rpm
86daf8dbae84e536a637fe0cc0fced7f 
6.0/RPMS/kernel-pcmcia-cs-2.2.19-4.6mdk.i586.rpm
0c4106b4025986b76af97848e421c437 
6.0/RPMS/kernel-secure-2.2.19-4.6mdk.i586.rpm
06ef51ec45fec0f67bd4719c44ed3965 
6.0/RPMS/kernel-smp-2.2.19-4.6mdk.i586.rpm
cc28675100767f8f4810c18e93f678fc 
6.0/RPMS/kernel-source-2.2.19-4.6mdk.i586.rpm
c9fe90d26e275124c5544c06d41822aa 
6.0/RPMS/kernel-utils-2.2.19-4.6mdk.i586.rpm
a7d7f50e53eff25b9c939b7575ff25fc 
6.0/RPMS/reiserfs-utils-2.2.19_3.5.29-4.6mdk.i586.rpm
16355590c240a43c172b0414f2ffd8c5  6.0/SRPMS/kernel-2.2.19-4.6mdk.src.rpm

Linux-Mandrake 6.1:
98248d95def8d43b396815e28d0c2ce5  6.1/RPMS/kernel-2.2.19-4.5mdk.i586.rpm
e2633a1b043a2411d5bdc1ad62960775 
6.1/RPMS/kernel-doc-2.2.19-4.5mdk.i586.rpm
1f88e9c3367aaf950ad954163438d64e 
6.1/RPMS/kernel-headers-2.2.19-4.5mdk.i586.rpm
73f43b886e8a972271a8aefdb61a75ce 
6.1/RPMS/kernel-pcmcia-cs-2.2.19-4.5mdk.i586.rpm
769aa585f4fb855f574096500d0adbb2 
6.1/RPMS/kernel-secure-2.2.19-4.5mdk.i586.rpm
2df67de9971daff29736ec121b600fcb 
6.1/RPMS/kernel-smp-2.2.19-4.5mdk.i586.rpm
c6803f72684aaff25bf7eb0e7486b652 
6.1/RPMS/kernel-source-2.2.19-4.5mdk.i586.rpm
f6491ed2f0d812c0ca6928ea47156dcd 
6.1/RPMS/kernel-utils-2.2.19-4.5mdk.i586.rpm
26182f6aa42f22a6e47f0be54e9c1e7f 
6.1/RPMS/reiserfs-utils-2.2.19_3.5.29-4.5mdk.i586.rpm
65b9b26963f7d2ae4e900d91d5afc8fc  6.1/SRPMS/kernel-2.2.19-4.5mdk.src.rpm

Linux-Mandrake 7.0:
9eb48b0cea6390220cf1d4a0f31ae9ed 
7.0/RPMS/alsa-2.2.19_0.5.10b-4.4mdk.i586.rpm
fa7c911ad6d789557adca7ab6a9a34bb 
7.0/RPMS/alsa-source-2.2.19_0.5.10b-4.4mdk.i586.rpm
ec1a34a15bdf7a76b5f9fd543db4d897  7.0/RPMS/kernel-2.2.19-4.4mdk.i586.rpm
885d2afbf16e9b05ba66b6716475cd4a 
7.0/RPMS/kernel-doc-2.2.19-4.4mdk.i586.rpm
f29d3c03075cb266b2d9286bc919a09a 
7.0/RPMS/kernel-headers-2.2.19-4.4mdk.i586.rpm
2ac6af9becc96f1c8615027c726034ed 
7.0/RPMS/kernel-linus-2.2.19-1.1mdk.i586.rpm
69272e0ed4413c51ab593512805ba22e 
7.0/RPMS/kernel-pcmcia-cs-2.2.19-4.4mdk.i586.rpm
08bacbb3b4a2480c8d654a9b58f8963f 
7.0/RPMS/kernel-secure-2.2.19-4.4mdk.i586.rpm
88a68d5bc1779f91d13c6c5d8ffa9127 
7.0/RPMS/kernel-smp-2.2.19-4.4mdk.i586.rpm
66281a0c42ab4aa0a4620f92abd61c46 
7.0/RPMS/kernel-source-2.2.19-4.4mdk.i586.rpm
861cbc44c62e3ab7d1284d29a5373e03 
7.0/RPMS/kernel-utils-2.2.19-4.4mdk.i586.rpm
0a242233c013ca9f728085855f8e383b 
7.0/RPMS/reiserfs-utils-2.2.19_3.5.29-4.4mdk.i586.rpm
e960f1ee495cd418925706d51907a4e1  7.0/SRPMS/kernel-2.2.19-4.4mdk.src.rpm
134f46c445c1f1f0afa607efe19bd85e 
7.0/SRPMS/kernel-linus-2.2.19-1.1mdk.src.rpm

Linux-Mandrake 7.1:
c844f293e5adeb7b65a20544da101861 
7.1/RPMS/alsa-2.2.19_0.5.10b-4.3mdk.i586.rpm
c96d2f9d400dce99e7d835d7090ec8d1 
7.1/RPMS/alsa-source-2.2.19_0.5.10b-4.3mdk.i586.rpm
9aad7c86ba24eb7f4f858d3dc793bab2  7.1/RPMS/kernel-2.2.19-4.3mdk.i586.rpm
91b4789c9e322501c053dee75873bace 
7.1/RPMS/kernel-doc-2.2.19-4.3mdk.i586.rpm
651d6b35a92143a1f15ad3d61c4a3769 
7.1/RPMS/kernel-headers-2.2.19-4.3mdk.i586.rpm
8df874be1da1c692060ad72b7da277c2 
7.1/RPMS/kernel-linus-2.2.19-1.1mdk.i586.rpm
54d0afcbadb9b61d92c8e23cae20c8a4 
7.1/RPMS/kernel-pcmcia-cs-2.2.19-4.3mdk.i586.rpm
9329644060c1ef79c4efd48dc6a9820c 
7.1/RPMS/kernel-secure-2.2.19-4.3mdk.i586.rpm
56abbf267082304e476765a019a8b359 
7.1/RPMS/kernel-smp-2.2.19-4.3mdk.i586.rpm
01873d5c28870ef2e7c2decd2b9a934a 
7.1/RPMS/kernel-source-2.2.19-4.3mdk.i586.rpm
0e43ffd93619eeca986bbb293b116098 
7.1/RPMS/kernel-utils-2.2.19-4.3mdk.i586.rpm
f29ef6a7933f02c5f0d49ecc8a02a6a1 
7.1/RPMS/reiserfs-utils-2.2.19_3.5.29-4.3mdk.i586.rpm
108a9edb5164b8b9f5983ddf104d1bb1  7.1/SRPMS/kernel-2.2.19-4.3mdk.src.rpm
134f46c445c1f1f0afa607efe19bd85e 
7.1/SRPMS/kernel-linus-2.2.19-1.1mdk.src.rpm

Linux-Mandrake 7.2:
4263a6ec09e39ee5cff90ef8162bbdaf 
7.2/RPMS/alsa-2.2.19_0.5.10b-4.1mdk.i586.rpm
98c74f3ffada4eb05c0295a0d7ac11de 
7.2/RPMS/alsa-source-2.2.19_0.5.10b-4.1mdk.i586.rpm
c4b0225399ce09e18f1d92505da6c18e  7.2/RPMS/kernel-2.2.19-4.1mdk.i586.rpm
7bb7ba06786e78a469dc7e0c2a382873 
7.2/RPMS/kernel-doc-2.2.19-4.1mdk.i586.rpm
e4f51a300913232780b402e41b33561b 
7.2/RPMS/kernel-headers-2.2.19-4.1mdk.i586.rpm
da682c4930d0bbebbbe3e28382d9c019 
7.2/RPMS/kernel-linus-2.2.19-1.1mdk.i586.rpm
a0a369ccd3b93fd18c75bc74028e4d2f 
7.2/RPMS/kernel-pcmcia-cs-2.2.19-4.1mdk.i586.rpm
19a4f69af8652fd389d65e253be23bbf 
7.2/RPMS/kernel-secure-2.2.19-4.1mdk.i586.rpm
e878e01e6d1a8a155fdbf17073e1b60d 
7.2/RPMS/kernel-smp-2.2.19-4.1mdk.i586.rpm
17c8137d83e13dea7b083c5cdb67d723 
7.2/RPMS/kernel-source-2.2.19-4.1mdk.i586.rpm
c83d9df0cc0234c254823073a2545d63 
7.2/RPMS/kernel-utils-2.2.19-4.1mdk.i586.rpm
ec8fbcb2b6aa0cdcf8b069540be4a661 
7.2/RPMS/reiserfs-utils-2.2.19_3.5.29-4.1mdk.i586.rpm
cd175b4c5d940bf46dbc6e3a025aba14  7.2/SRPMS/kernel-2.2.19-4.1mdk.src.rpm
134f46c445c1f1f0afa607efe19bd85e 
7.2/SRPMS/kernel-linus-2.2.19-1.1mdk.src.rpm

Corporate Server 1.0.1:
1ee205464fc96a51871bd07e209403be 
1.0.1/RPMS/alsa-2.2.19_0.5.10b-4.7mdk.i586.rpm
e3f329d940ceb06b605c7cc97cae5128 
1.0.1/RPMS/alsa-source-2.2.19_0.5.10b-4.7mdk.i586.rpm
cfa396c4424bb390c510f975de626d4f 
1.0.1/RPMS/kernel-2.2.19-4.7mdk.i586.rpm
5005b4deb1c6bbdc7513b315b971eb9b 
1.0.1/RPMS/kernel-doc-2.2.19-4.7mdk.i586.rpm
5698fd2539d0f9f54a0d5e066119f7be 
1.0.1/RPMS/kernel-headers-2.2.19-4.7mdk.i586.rpm
3d31bff588b0b089e4db3250ce7bc3f7 
1.0.1/RPMS/kernel-linus-2.2.19-1.1mdk.i586.rpm
fe3fbd5d666c7ece6983445f9d714224 
1.0.1/RPMS/kernel-pcmcia-cs-2.2.19-4.7mdk.i586.rpm
9d6a6bade0200f4807f707896284ceca 
1.0.1/RPMS/kernel-secure-2.2.19-4.7mdk.i586.rpm
6100331c78f63f5e8d7d1dc831e9a523 
1.0.1/RPMS/kernel-smp-2.2.19-4.7mdk.i586.rpm
e1ea8f81cad0a137e5224384822ef12e 
1.0.1/RPMS/kernel-source-2.2.19-4.7mdk.i586.rpm
93771a0034d87a149abb16c6cabc36ea 
1.0.1/RPMS/kernel-utils-2.2.19-4.7mdk.i586.rpm
7deb47e80f109076e3cac83c7883e940 
1.0.1/RPMS/reiserfs-utils-2.2.19_3.5.29-4.7mdk.i586.rpm
688cf912a9072b455f85839340c1c86b 
1.0.1/SRPMS/kernel-2.2.19-4.7mdk.src.rpm
134f46c445c1f1f0afa607efe19bd85e 
1.0.1/SRPMS/kernel-linus-2.2.19-1.1mdk.src.rpm
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm".

You can download the updates directly from one of the mirror sites
listed at:

  http://www.linux-mandrake.com/en/ftp.php3.

Updated packages are available in the "updates/[ver]/RPMS/" directory.
For example, if you are looking for an updated RPM package for
Linux-Mandrake 7.2, look for it in "updates/7.2/RPMS/".  Updated source
RPMs are available as well, but you generally do not need to download
them.

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other security advisories for Linux-Mandrake at:

  http://www.linux-mandrake.com/en/security/

If you want to report vulnerabilities, please contact

  security@linux-mandrake.com
________________________________________________________________________

Linux-Mandrake has two security-related mailing list services that
anyone can subscribe to:

security-announce@linux-mandrake.com

  Linux-Mandrake's security announcements mailing list.  Only
  announcements are sent to this list and it is read-only.

security-discuss@linux-mandrake.com

  Linux-Mandrake's security discussion mailing list.  This list is open
  to anyone to discuss Linux-Mandrake security specifically and Linux
  security in general.

To subscribe to either list, send a message to
  sympa@linux-mandrake.com
with "subscribe [listname]" in the body of the message.

To remove yourself from either list, send a message to
  sympa@linux-mandrake.com
with "unsubscribe [listname]" in the body of the message.

To get more information on either list, send a message to
  sympa@linux-mandrake.com
with "info [listname]" in the body of the message.

Optionally, you can use the web interface to subscribe to or unsubscribe
from either list:

  http://www.linux-mandrake.com/en/flists.php3#security
________________________________________________________________________

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security@linux-mandrake.com>


- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
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=WxWn
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6252imqjQ0CJFipgRAgNRAKCP2X515HkhDg02I3ifqf3lcmiBhgCg8QGJ
pdGybA9kBFQl+97xj5p2iMM=
=XD9n
-----END PGP SIGNATURE-----



             reply	other threads:[~2001-04-18 14:07 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2001-04-18 14:07 vserge [this message]
2001-04-18 14:36 ` [mdk-re] " Dmitry V. Levin
2001-04-18 18:47   ` dsv
2001-04-19 19:12     ` [mdk-re] New Mandrake Update Volckov Konstantin Michailovich
2001-04-19 19:33       ` dsv

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3ADD67AC.AD5C5DF9@menatepspb.msk.ru \
    --to=vserge@menatepspb.msk.ru \
    --cc=mandrake-russian@altlinux.ru \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link

ALT Linux Community general discussions

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/community/0 community/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 community community/ http://lore.altlinux.org/community \
		mandrake-russian@linuxteam.iplabs.ru community@lists.altlinux.org community@lists.altlinux.ru community@lists.altlinux.com
	public-inbox-index community

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.community


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git