Lucene search

K
slackwareSlackware Linux ProjectSSA-2024-157-01
HistoryJun 05, 2024 - 7:11 p.m.

[slackware-security] Slackware 15.0 kernel

2024-06-0519:11:11
Slackware Linux Project
www.slackware.com
4
slackware 15.0
kernel
security issues
updates
cve-2023-52340
cve-2023-6040
cve-2024-0646
cve-2023-46838
cve-2023-52436
cve-2023-52438
cve-2023-52439
cve-2023-52443
cve-2023-52444
cve-2023-52445
cve-2023-52448
cve-2023-52449
cve-2023-52451
cve-2023-52454
cve-2023-52456
cve-2023-52458
cve-2023-52463
cve-2023-52464
cve-2023-52467
cve-2023-52469
cve-2023-52470
cve-2023-52609
cve-2023-52610
cve-2023-52612
cve-2023-6356
cve-2023-6536
cve-2023-6915
cve-2024-1085
cve-2024-24860
cve-2024-26586
cve-2024-26589
cve-2024-26591
cve-2024-26597
cve-2024-26598
cve-2024-26631
cve-2024-26633
cve-2023-52429
cve-2023-52435
cve-2023-52486
cve-2023-52489
cve-2023-52491
cve-2023-52492
cve-2023-52493
cve-2023-52494
cve-2023-52498
cve-2023-52583
cve-2023-52587
cve-2023-52588
cve-2023-52594
cve-2023-52595
cve-2023-52597
cve-2023-52598
cve-2023-52599
cve-2023-52600
cve-2023-52601
cve-2023-52602
cve-2023-52603
cve-2023-52604
cve-2023-52606
cve-2023-52607
cve-2023-52608
cve-2023-52614

8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.4%

New kernel packages are available for Slackware 15.0 to fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/linux-5.15.160/: Upgraded.
These updates fix various bugs and security issues.
Be sure to upgrade your initrd after upgrading the kernel packages.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 5.15.147:
https://vulners.com/cve/CVE-2023-52340
https://vulners.com/cve/CVE-2023-6040
https://vulners.com/cve/CVE-2024-0646
Fixed in 5.15.148:
https://vulners.com/cve/CVE-2023-46838
https://vulners.com/cve/CVE-2023-52436
https://vulners.com/cve/CVE-2023-52438
https://vulners.com/cve/CVE-2023-52439
https://vulners.com/cve/CVE-2023-52443
https://vulners.com/cve/CVE-2023-52444
https://vulners.com/cve/CVE-2023-52445
https://vulners.com/cve/CVE-2023-52448
https://vulners.com/cve/CVE-2023-52449
https://vulners.com/cve/CVE-2023-52451
https://vulners.com/cve/CVE-2023-52454
https://vulners.com/cve/CVE-2023-52456
https://vulners.com/cve/CVE-2023-52458
https://vulners.com/cve/CVE-2023-52463
https://vulners.com/cve/CVE-2023-52464
https://vulners.com/cve/CVE-2023-52467
https://vulners.com/cve/CVE-2023-52469
https://vulners.com/cve/CVE-2023-52470
https://vulners.com/cve/CVE-2023-52609
https://vulners.com/cve/CVE-2023-52610
https://vulners.com/cve/CVE-2023-52612
https://vulners.com/cve/CVE-2023-6356
https://vulners.com/cve/CVE-2023-6536
https://vulners.com/cve/CVE-2023-6915
https://vulners.com/cve/CVE-2024-1085
https://vulners.com/cve/CVE-2024-24860
https://vulners.com/cve/CVE-2024-26586
https://vulners.com/cve/CVE-2024-26589
https://vulners.com/cve/CVE-2024-26591
https://vulners.com/cve/CVE-2024-26597
https://vulners.com/cve/CVE-2024-26598
https://vulners.com/cve/CVE-2024-26631
https://vulners.com/cve/CVE-2024-26633
Fixed in 5.15.149:
https://vulners.com/cve/CVE-2023-52429
https://vulners.com/cve/CVE-2023-52435
https://vulners.com/cve/CVE-2023-52486
https://vulners.com/cve/CVE-2023-52489
https://vulners.com/cve/CVE-2023-52491
https://vulners.com/cve/CVE-2023-52492
https://vulners.com/cve/CVE-2023-52493
https://vulners.com/cve/CVE-2023-52494
https://vulners.com/cve/CVE-2023-52498
https://vulners.com/cve/CVE-2023-52583
https://vulners.com/cve/CVE-2023-52587
https://vulners.com/cve/CVE-2023-52588
https://vulners.com/cve/CVE-2023-52594
https://vulners.com/cve/CVE-2023-52595
https://vulners.com/cve/CVE-2023-52597
https://vulners.com/cve/CVE-2023-52598
https://vulners.com/cve/CVE-2023-52599
https://vulners.com/cve/CVE-2023-52600
https://vulners.com/cve/CVE-2023-52601
https://vulners.com/cve/CVE-2023-52602
https://vulners.com/cve/CVE-2023-52603
https://vulners.com/cve/CVE-2023-52604
https://vulners.com/cve/CVE-2023-52606
https://vulners.com/cve/CVE-2023-52607
https://vulners.com/cve/CVE-2023-52608
https://vulners.com/cve/CVE-2023-52614
https://vulners.com/cve/CVE-2023-52615
https://vulners.com/cve/CVE-2023-52616
https://vulners.com/cve/CVE-2023-52617
https://vulners.com/cve/CVE-2023-52618
https://vulners.com/cve/CVE-2023-52619
https://vulners.com/cve/CVE-2023-52622
https://vulners.com/cve/CVE-2023-52623
https://vulners.com/cve/CVE-2023-52627
https://vulners.com/cve/CVE-2023-52630
https://vulners.com/cve/CVE-2023-52631
https://vulners.com/cve/CVE-2023-52633
https://vulners.com/cve/CVE-2023-52635
https://vulners.com/cve/CVE-2023-52637
https://vulners.com/cve/CVE-2023-52638
https://vulners.com/cve/CVE-2024-0340
https://vulners.com/cve/CVE-2024-1086
https://vulners.com/cve/CVE-2024-1151
https://vulners.com/cve/CVE-2024-23849
https://vulners.com/cve/CVE-2024-23850
https://vulners.com/cve/CVE-2024-23851
https://vulners.com/cve/CVE-2024-26592
https://vulners.com/cve/CVE-2024-26593
https://vulners.com/cve/CVE-2024-26594
https://vulners.com/cve/CVE-2024-26600
https://vulners.com/cve/CVE-2024-26602
https://vulners.com/cve/CVE-2024-26606
https://vulners.com/cve/CVE-2024-26608
https://vulners.com/cve/CVE-2024-26610
https://vulners.com/cve/CVE-2024-26614
https://vulners.com/cve/CVE-2024-26615
https://vulners.com/cve/CVE-2024-26625
https://vulners.com/cve/CVE-2024-26627
https://vulners.com/cve/CVE-2024-26635
https://vulners.com/cve/CVE-2024-26636
https://vulners.com/cve/CVE-2024-26640
https://vulners.com/cve/CVE-2024-26641
https://vulners.com/cve/CVE-2024-26644
https://vulners.com/cve/CVE-2024-26645
https://vulners.com/cve/CVE-2024-26660
https://vulners.com/cve/CVE-2024-26663
https://vulners.com/cve/CVE-2024-26664
https://vulners.com/cve/CVE-2024-26665
https://vulners.com/cve/CVE-2024-26668
https://vulners.com/cve/CVE-2024-26671
https://vulners.com/cve/CVE-2024-26673
https://vulners.com/cve/CVE-2024-26675
https://vulners.com/cve/CVE-2024-26676
https://vulners.com/cve/CVE-2024-26679
https://vulners.com/cve/CVE-2024-26684
https://vulners.com/cve/CVE-2024-26685
https://vulners.com/cve/CVE-2024-26689
https://vulners.com/cve/CVE-2024-26696
https://vulners.com/cve/CVE-2024-26697
https://vulners.com/cve/CVE-2024-26698
https://vulners.com/cve/CVE-2024-26702
https://vulners.com/cve/CVE-2024-26704
https://vulners.com/cve/CVE-2024-26707
https://vulners.com/cve/CVE-2024-26712
https://vulners.com/cve/CVE-2024-26715
https://vulners.com/cve/CVE-2024-26717
https://vulners.com/cve/CVE-2024-26720
https://vulners.com/cve/CVE-2024-26727
https://vulners.com/cve/CVE-2024-26808
Fixed in 5.15.150:
https://vulners.com/cve/CVE-2023-52434
https://vulners.com/cve/CVE-2023-52497
https://vulners.com/cve/CVE-2023-52640
https://vulners.com/cve/CVE-2023-52641
https://vulners.com/cve/CVE-2024-0565
https://vulners.com/cve/CVE-2024-26601
https://vulners.com/cve/CVE-2024-26603
https://vulners.com/cve/CVE-2024-26733
https://vulners.com/cve/CVE-2024-26735
https://vulners.com/cve/CVE-2024-26736
https://vulners.com/cve/CVE-2024-26737
https://vulners.com/cve/CVE-2024-26743
https://vulners.com/cve/CVE-2024-26744
https://vulners.com/cve/CVE-2024-26747
https://vulners.com/cve/CVE-2024-26748
https://vulners.com/cve/CVE-2024-26749
https://vulners.com/cve/CVE-2024-26751
https://vulners.com/cve/CVE-2024-26752
https://vulners.com/cve/CVE-2024-26754
https://vulners.com/cve/CVE-2024-26763
https://vulners.com/cve/CVE-2024-26764
https://vulners.com/cve/CVE-2024-26766
https://vulners.com/cve/CVE-2024-26769
https://vulners.com/cve/CVE-2024-26771
https://vulners.com/cve/CVE-2024-26772
https://vulners.com/cve/CVE-2024-26773
https://vulners.com/cve/CVE-2024-26774
https://vulners.com/cve/CVE-2024-26776
https://vulners.com/cve/CVE-2024-26777
https://vulners.com/cve/CVE-2024-26778
https://vulners.com/cve/CVE-2024-26779
Fixed in 5.15.151:
https://vulners.com/cve/CVE-2023-52620
https://vulners.com/cve/CVE-2024-0841
https://vulners.com/cve/CVE-2024-26622
https://vulners.com/cve/CVE-2024-26688
https://vulners.com/cve/CVE-2024-26782
https://vulners.com/cve/CVE-2024-26788
https://vulners.com/cve/CVE-2024-26790
https://vulners.com/cve/CVE-2024-26791
https://vulners.com/cve/CVE-2024-26793
https://vulners.com/cve/CVE-2024-26795
https://vulners.com/cve/CVE-2024-26798
https://vulners.com/cve/CVE-2024-26801
https://vulners.com/cve/CVE-2024-26802
https://vulners.com/cve/CVE-2024-26803
https://vulners.com/cve/CVE-2024-26804
https://vulners.com/cve/CVE-2024-26805
Fixed in 5.15.152:
https://vulners.com/cve/CVE-2024-26659
https://vulners.com/cve/CVE-2024-26787
Fixed in 5.15.153:
https://vulners.com/cve/CVE-2023-52447
https://vulners.com/cve/CVE-2023-6270
https://vulners.com/cve/CVE-2023-7042
https://vulners.com/cve/CVE-2024-22099
https://vulners.com/cve/CVE-2024-26651
https://vulners.com/cve/CVE-2024-26809
(
Security fix *)

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-generic-5.15.160-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-generic-smp-5.15.160_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-headers-5.15.160_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-huge-5.15.160-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-huge-smp-5.15.160_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-modules-5.15.160-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-modules-smp-5.15.160_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/linux-5.15.160/kernel-source-5.15.160_smp-noarch-1.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.160/kernel-generic-5.15.160-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.160/kernel-headers-5.15.160-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.160/kernel-huge-5.15.160-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.160/kernel-modules-5.15.160-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/linux-5.15.160/kernel-source-5.15.160-noarch-1.txz

MD5 signatures:

Slackware 15.0 packages:
9a5f0b30b8557ee0f995e157e668bbab kernel-generic-5.15.160-i586-1.txz
dbc4ab11932f6e1b53f31bfa28bbd920 kernel-generic-smp-5.15.160_smp-i686-1.txz
9d916ab958cb3efafedca2b4d63787b6 kernel-headers-5.15.160_smp-x86-1.txz
9f15be076ef0edce60ce9c0024b1f2ce kernel-huge-5.15.160-i586-1.txz
cb88980a1a24894d809904add3571c90 kernel-huge-smp-5.15.160_smp-i686-1.txz
2d971a34e5f0ca005e45ca9028de4085 kernel-modules-5.15.160-i586-1.txz
1f5ae65fd73694a902c6210b21132c7f kernel-modules-smp-5.15.160_smp-i686-1.txz
02decce15d2cecaa97c63b2c44c57ecb kernel-source-5.15.160_smp-noarch-1.txz

Slackware x86_64 15.0 packages:
a08d3e9b7cd8acb1f3541423af4f5033 kernel-generic-5.15.160-x86_64-1.txz
3c4c4d0cf660b807f16d7a3d02a2bc98 kernel-headers-5.15.160-x86-1.txz
6459e19c0b7697bbfc8a37897f7f72d0 kernel-huge-5.15.160-x86_64-1.txz
d993f853995368eef81caacc7b2fc454 kernel-modules-5.15.160-x86_64-1.txz
d973ec20bc738201d4e6a3de344b7257 kernel-source-5.15.160-noarch-1.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg kernel-*.txz

If you are using an initrd, you’ll need to rebuild it.

For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 15.0):
> /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 5.15.160-smp | bash

For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 15.0):
> /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 5.15.160 | bash

Please note that “uniprocessor” has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren’t sure which
kernel you are running, run “uname -a”. If you see SMP there, you are
running the SMP kernel and should use the 5.15.160-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit – 64-bit
systems should always use 5.15.160 as the version.

If you are using lilo or elilo to boot the machine, you’ll need to ensure
that the machine is properly prepared before rebooting.

If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel. No editing should be required
unless your machine uses a custom lilo.conf. If that is the case, be sure
that the image= line references the correct kernel file. Either way,
you’ll need to run “lilo” as root to reinstall the boot loader.

If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.

8 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.9 High

AI Score

Confidence

High

0.011 Low

EPSS

Percentile

84.4%