Lucene search

K
slackwareSlackware Linux ProjectSSA-2022-237-02
HistoryAug 26, 2022 - 4:17 a.m.

[slackware-security] Slackware 15.0 kernel

2022-08-2604:17:47
Slackware Linux Project
www.slackware.com
47
slackware 15.0
kernel
security issues
upgrade
lilo
elilo
cve-2022-1974
cve-2022-1975
cve-2022-1734
cve-2022-1943
cve-2022-28893
cve-2022-32296
cve-2022-1012
cve-2022-1652
cve-2022-1729
cve-2022-21499
cve-2022-1789
cve-2022-2873
cve-2022-1966
cve-2022-32250
cve-2022-2078
cve-2022-1852
cve-2022-1972
cve-2022-2503
cve-2022-1184
cve-2022-1973
cve-2022-34494
cve-2022-34495
cve-2022-32981
cve-2022-21125
cve-2022-21166
cve-2022-21123
cve-2022-2318
cve-2022-33743
cve-2022-33742
cve-2022-33741
cve-2022-33740
cve-2022-26365
cve-2022-33744
cve-2021-33655
cve-2022-34918
cve-2022-36123
cve-2022-29900
cve-2022-29901
cve-2022-21505
cve-2022-1462
cve-2022-36879
cve-2022-36946
cve-2022-26373
cve-2022-2586
cve-2022-2585
cve-2022-1679
cve-2022-2588

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

EPSS

0.01

Percentile

84.1%

New kernel packages are available for Slackware 15.0 to fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/linux-5.15.63/: Upgraded.
These updates fix various bugs and security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 5.15.39:
https://vulners.com/cve/CVE-2022-1974
https://vulners.com/cve/CVE-2022-1975
https://vulners.com/cve/CVE-2022-1734
Fixed in 5.15.40:
https://vulners.com/cve/CVE-2022-1943
Fixed in 5.15.41:
https://vulners.com/cve/CVE-2022-28893
https://vulners.com/cve/CVE-2022-32296
https://vulners.com/cve/CVE-2022-1012
Fixed in 5.15.42:
https://vulners.com/cve/CVE-2022-1652
https://vulners.com/cve/CVE-2022-1729
https://vulners.com/cve/CVE-2022-21499
Fixed in 5.15.44:
https://vulners.com/cve/CVE-2022-1789
Fixed in 5.15.45:
https://vulners.com/cve/CVE-2022-2873
https://vulners.com/cve/CVE-2022-1966
https://vulners.com/cve/CVE-2022-32250
https://vulners.com/cve/CVE-2022-2078
https://vulners.com/cve/CVE-2022-1852
https://vulners.com/cve/CVE-2022-1972
https://vulners.com/cve/CVE-2022-2503
Fixed in 5.15.46:
https://vulners.com/cve/CVE-2022-1184
https://vulners.com/cve/CVE-2022-1973
Fixed in 5.15.47:
https://vulners.com/cve/CVE-2022-34494
https://vulners.com/cve/CVE-2022-34495
https://vulners.com/cve/CVE-2022-32981
Fixed in 5.15.48:
https://vulners.com/cve/CVE-2022-21125
https://vulners.com/cve/CVE-2022-21166
https://vulners.com/cve/CVE-2022-21123
Fixed in 5.15.53:
https://vulners.com/cve/CVE-2022-2318
https://vulners.com/cve/CVE-2022-33743
https://vulners.com/cve/CVE-2022-33742
https://vulners.com/cve/CVE-2022-33741
https://vulners.com/cve/CVE-2022-33740
https://vulners.com/cve/CVE-2022-26365
https://vulners.com/cve/CVE-2022-33744
Fixed in 5.15.54:
https://vulners.com/cve/CVE-2021-33655
https://vulners.com/cve/CVE-2022-34918
Fixed in 5.15.56:
https://vulners.com/cve/CVE-2022-36123
Fixed in 5.15.57:
https://vulners.com/cve/CVE-2022-29900
https://vulners.com/cve/CVE-2022-29901
Fixed in 5.15.58:
https://vulners.com/cve/CVE-2022-21505
https://vulners.com/cve/CVE-2022-1462
https://vulners.com/cve/CVE-2022-36879
Fixed in 5.15.59:
https://vulners.com/cve/CVE-2022-36946
Fixed in 5.15.60:
https://vulners.com/cve/CVE-2022-26373
Fixed in 5.15.61:
https://vulners.com/cve/CVE-2022-2586
https://vulners.com/cve/CVE-2022-2585
https://vulners.com/cve/CVE-2022-1679
https://vulners.com/cve/CVE-2022-2588
(
Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-generic-5.15.63-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-generic-smp-5.15.63_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-headers-5.15.63_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-huge-5.15.63-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-huge-smp-5.15.63_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-modules-5.15.63-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-modules-smp-5.15.63_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.63/kernel-source-5.15.63_smp-noarch-1.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.63/kernel-generic-5.15.63-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.63/kernel-headers-5.15.63-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.63/kernel-huge-5.15.63-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.63/kernel-modules-5.15.63-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.63/kernel-source-5.15.63-noarch-1.txz

MD5 signatures:

Slackware 15.0 packages:
5c31aac999b00d15a783e6094f637532 kernel-generic-5.15.63-i586-1.txz
6f8347f7b51fb9b27874d77b94ec6f30 kernel-generic-smp-5.15.63_smp-i686-1.txz
311adc6da684773615a101ea19414113 kernel-headers-5.15.63_smp-x86-1.txz
9beb03283db3704d81b2d5891a02aa53 kernel-huge-5.15.63-i586-1.txz
4ef4877067f5e7c48e72d1454f0356bc kernel-huge-smp-5.15.63_smp-i686-1.txz
a8bc611fb93241a04e3ab3a8341fa16d kernel-modules-5.15.63-i586-1.txz
b5d3943050cc989ca2ff38cd8e9f8d57 kernel-modules-smp-5.15.63_smp-i686-1.txz
d4af5bb1a638d16f2f12c59330b6a4ed kernel-source-5.15.63_smp-noarch-1.txz

Slackware x86_64 15.0 packages:
3d90053137ecf7d6bba568f5220abfa3 kernel-generic-5.15.63-x86_64-1.txz
9e9140aee3e53f89c91e0da799b23938 kernel-headers-5.15.63-x86-1.txz
16a28b95d3918edc031ae3052851a003 kernel-huge-5.15.63-x86_64-1.txz
d60d98fd8308a12addffc3cec220729f kernel-modules-5.15.63-x86_64-1.txz
b7c3de6e71d39a80c7132c30799310ec kernel-source-5.15.63-noarch-1.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg kernel-*.txz

If you are using an initrd, you’ll need to rebuild it.

For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 15.0):
> /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 5.15.63-smp | bash

For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 15.0):
> /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 5.15.63 | bash

Please note that “uniprocessor” has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren’t sure which
kernel you are running, run “uname -a”. If you see SMP there, you are
running the SMP kernel and should use the 5.15.63-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit – 64-bit
systems should always use 5.15.63 as the version.

If you are using lilo or elilo to boot the machine, you’ll need to ensure
that the machine is properly prepared before rebooting.

If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel. No editing should be required
unless your machine uses a custom lilo.conf. If that is the case, be sure
that the image= line references the correct kernel file. Either way,
you’ll need to run “lilo” as root to reinstall the boot loader.

If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

EPSS

0.01

Percentile

84.1%