Slackware: Kernel update
Posted by LinuxSecurity.com Team   
Slackware Capabilities and other security vulnerabilities have been discovered
====================================
Kernel Version 2.2.16 Security Fixes
====================================

The 2.2.16 release of the Linux kernel is available and includes a number of
security fixes.  The following list of fixes comes from the kernel release 
notes:

----------------------------------------------------------------------------
Capabilities -
   Fixes for serious setuid handling flaws when using restricted capability 
   sets 
ELF loader -
   The ELF loader could be tricked by erroneous headers 
Procfs -
   Several /proc drivers failed to do correct sanity checking 
Readv/writev - 
   Potential overflow bug fixed 
Signal Stacks -
   Exec failed to clear an existing alternate sigstack 
System 5 Shared Memory -
   If a user managed to attach a segment 65536 times bad things happened. 
TCP multiconnect hang -
   The TCP code had a bug that could cause the machine to hang. This was user 
   exploitable. 
-----------------------------------------------------------------------------

We recommend that you read the above as a list of reasons to upgrade to 2.2.16,
if you're running a 2.2.x kernel.  The capabilities hole is especially nasty,
as it allows a local user to gain root access from a program that normally
drops root privileges.

The standard pre-built Slackware kernels have been built from 2.2.16 source 
and are now available in Slackware-current:

     ftp://ftp.slackware.com/pub/slackware/slackware-current/kernels/

You will probably also need a new set of modules, available from:

     ftp://ftp.slackware.com/pub/slackware/slackware-current/modules/

They are also available in packaged form in the slackware-current ftp tree
(ftp://ftp.slackware.com/pub/slackware/slackware-current/slakware/).  The
files, within that directory, are:

     a1/modules.tgz, a1/scsimods.tgz, a1/sndmods.tgz, a1/fsmods.tgz,
     and n1/netmods.tgz

The kernel release notes are available here:

     http://www.linux.org.uk/VERSION/relnotes.2216.html