LinuxQuestions.org
Visit Jeremy's Blog.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 08-23-2016, 07:54 PM   #1
hitest
Guru
 
Registered: Mar 2004
Location: Canada
Distribution: Void, Debian, Slackware
Posts: 7,342

Rep: Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746Reputation: 3746
Kernel upgrade in Slackware 14.2


Interesting to note that the kernel has been upgraded in Slackware 14.2 to 4.4.19. Take care to read the changelog before upgrading.

Code:
Tue Aug 23 19:45:33 UTC 2016
patches/packages/gnupg-1.4.21-x86_64-1_slack14.2.txz:  Upgraded.
  Fix critical security bug in the RNG [CVE-2016-6313].  An attacker who
  obtains 580 bytes from the standard RNG can trivially predict the next
  20 bytes of output.  (This is according to the NEWS file included in the
  source.  According to the annoucement linked below, an attacker who obtains
  4640 bits from the RNG can trivially predict the next 160 bits of output.)
  Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
  For more information, see:
    https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
  (* Security fix *)
patches/packages/glib2-2.46.2-x86_64-3_slack14.2.txz:  Rebuilt.
  Applied upstream patch to fix a use-before-allocate bug in libgio.  Without
  this fix, Thunar will crash if $HOME is on an NFS volume.
  Thanks to Jonathan Woithe.
patches/packages/libgcrypt-1.7.3-x86_64-1_slack14.2.txz:  Upgraded.
  Fix critical security bug in the RNG [CVE-2016-6313].  An attacker who
  obtains 580 bytes from the standard RNG can trivially predict the next
  20 bytes of output.  (This is according to the NEWS file included in the
  source.  According to the annoucement linked below, an attacker who obtains
  4640 bits from the RNG can trivially predict the next 160 bits of output.)
  Problem detected by Felix Doerre and Vladimir Klebanov, KIT.
  For more information, see:
    https://lists.gnupg.org/pipermail/gnupg-announce/2016q3/000395.html
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313
  (* Security fix *)
patches/packages/linux-4.4.19/*:  Upgraded.
  A flaw was found in the implementation of the Linux kernels handling of
  networking challenge ack where an attacker is able to determine the shared
  counter.  This may allow an attacker located on different subnet to inject
  or take over a TCP connection between a server and client without having to
  be a traditional Man In the Middle (MITM) style attack.
  Be sure to upgrade your initrd after upgrading the kernel packages.
  If you use lilo to boot your machine, be sure lilo.conf points to the correct
  kernel and initrd and run lilo as root to update the bootloader.
  If you use elilo to boot your machine, you should run eliloconfig to copy the
  kernel and initrd to the EFI System Partition.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5389
  (* Security fix *)
patches/packages/screen-4.4.0-x86_64-2_slack14.2.txz:  Rebuilt.
  Reverted a change to /etc/screenrc.new that prevented the console from being
  cleared when a screen session was detached.  Thanks to Stuart Winter.
patches/packages/stunnel-5.35-x86_64-2_slack14.2.txz:  Rebuilt.
  Fixed incorrect config file name in generate-stunnel-key.sh.
  Thanks to Ebben Aries.

Last edited by hitest; 08-23-2016 at 07:56 PM. Reason: shorten post
 
Old 08-24-2016, 01:50 AM   #2
qweasd
Member
 
Registered: May 2010
Posts: 621

Rep: Reputation: Disabled
Has that ever happened before? I mean, I tried to find an instance when Slackware released a newer kernel than the one glibc was built with, and I could not . Many people, a kernel dev too, assured me it is safe in practice, while may lead to abi-related hiccups in principle.
 
Old 08-24-2016, 03:04 AM   #3
phenixia2003
Senior Member
 
Registered: May 2006
Location: France
Distribution: Slackware
Posts: 1,052

Rep: Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008Reputation: 1008
Quote:
Originally Posted by qweasd View Post
Has that ever happened before? I mean, I tried to find an instance when Slackware released a newer kernel than the one glibc was built with, and I could not .
The most recent was for slackware-14.0 :
Code:
+--------------------------+
Mon Jun  3 22:10:16 UTC 2013
patches/packages/linux-3.2.45/*:  Rebuilt.
  One more reverted commit.  This one was leading to hangs on systems with
  Intel graphics.  The previous revert was also reverted in 3.2.46, but it
  seems safer to just get this one manually than to take the newer kernel and
  still have to do another patch to it anyway.  Hopefully the third time is
  the charm.  :)
+--------------------------+
Wed May 22 14:11:13 UTC 2013
patches/packages/linux-3.2.45/*:  Rebuilt.
  It appears a bad commit slipped into 3.2.45 and it's causing problems on
  systems that use Intel graphics.  The commit has been reverted in the kernel
  source packages and the kernels and modules have been rebuilt.  If you ran
  into the black screen problem before, this should fix it up.
+--------------------------+
Mon May 20 21:01:33 UTC 2013
patches/packages/linux-3.2.45/*:  Upgraded.
  Upgraded to new kernels that fix CVE-2013-2094, a bug that can allow local
  users to gain a root shell.  Be sure to upgrade your initrd and reinstall
  LILO after upgrading the kernel packages.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094
  (* Security fix *)
+--------------------------+


Quote:
Originally Posted by qweasd View Post
Many people, a kernel dev too, assured me it is safe in practice, while may lead to abi-related hiccups in principle.

I doubt there might be ABI issues with any version from the same kernel branch as the one originally shipped with Slackware-stable.

--
SeB
 
1 members found this post helpful.
Old 08-24-2016, 03:09 AM   #4
suppy
Member
 
Registered: Mar 2012
Location: Sweden
Distribution: Slackware
Posts: 83

Rep: Reputation: 60
Well, it's done in -current all the time, and considering how well -current works, it shouldn't be a problem. Also, if you think about it, all the stable slackware releases are simply -current ones that just get a little fewer updates than the real -current one.
 
1 members found this post helpful.
Old 08-24-2016, 03:25 AM   #5
allend
LQ 5k Club
 
Registered: Oct 2003
Location: Melbourne
Distribution: Slackware64-15.0
Posts: 6,371

Rep: Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750Reputation: 2750
Quote:
Has that ever happened before? I mean, I tried to find an instance when Slackware released a newer kernel than the one glibc was built with, and I could not .
Prior to the 14.0 instance, there is a 13.0 instance.
Quote:
Tue Dec 8 20:44:44 UTC 2009
patches/packages/linux-2.6.29.6-3/:
Added new kernels and kernel packages with a patch for CVE-2009-1298,
a kernel bug where oversized IP packets cause a NULL pointer dereference
and immediate hang.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename...=CVE-2009-1298
http://lkml.org/lkml/2009/11/25/104
Be sure to reinstall LILO after upgrading the kernel packages.
(* Security fix *)
 
Old 08-24-2016, 04:09 AM   #6
kjhambrick
Senior Member
 
Registered: Jul 2005
Location: Round Rock, TX
Distribution: Slackware64 15.0 + Multilib
Posts: 2,159

Rep: Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512Reputation: 1512
NBD but there was one for 13.37 as well:

# grep -B2 -A10 -- 'patches/packages/linux-' slackware-13.37-64/ChangeLog.txt
Code:
+--------------------------+
Mon May 20 21:01:33 UTC 2013
patches/packages/linux-2.6.37.6-3/*:  Rebuilt.
  Added new kernel packages with a patch for CVE-2013-2094, a bug that can
  allow local users to gain a root shell.  Be sure to reinstall LILO after
  upgrading the kernel packages.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094
  (* Security fix *)
+--------------------------+
Thu May 16 21:42:08 UTC 2013
patches/packages/ruby-1.9.3_p429-x86_64-1_slack13.37.txz:  Upgraded.
  This update fixes a security issue in DL and Fiddle included in Ruby where
I only remember it because I was a little concerned about breaking my working Slackware64 13.37 + Multilib Laptop

-- kjh
 
Old 08-24-2016, 10:13 AM   #7
qweasd
Member
 
Registered: May 2010
Posts: 621

Rep: Reputation: Disabled
Oh wow I missed all of that somehow... Thanks everyone!

@suppy, I know it is perfectly safe, I myself tend to run the testing kernel in stable, but I was curious how pervasive that practice was, as opposed to patching the same exact kernel, as it was done in 14.1.
 
Old 08-24-2016, 10:42 AM   #8
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Quote:
Originally Posted by allend View Post
Prior to the 14.0 instance, there is a 13.0 instance.
Quote:
Originally Posted by kjhambrick View Post
NBD but there was one for 13.37 as well:

# grep -B2 -A10 -- 'patches/packages/linux-' slackware-13.37-64/ChangeLog.txt
Code:
+--------------------------+
Mon May 20 21:01:33 UTC 2013
patches/packages/linux-2.6.37.6-3/*:  Rebuilt.
  Added new kernel packages with a patch for CVE-2013-2094, a bug that can
  allow local users to gain a root shell.  Be sure to reinstall LILO after
  upgrading the kernel packages.
  For more information, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2094
  (* Security fix *)
+--------------------------+
Thu May 16 21:42:08 UTC 2013
patches/packages/ruby-1.9.3_p429-x86_64-1_slack13.37.txz:  Upgraded.
  This update fixes a security issue in DL and Fiddle included in Ruby where
I only remember it because I was a little concerned about breaking my working Slackware64 13.37 + Multilib Laptop

-- kjh
From what I can tell, these are just patches to the same kernel version, not a new version like we're seeing here.

13.0 came with 2.6.29.6 and the patch was 2.6.29.6-3
13.37 came with 2.6.37.6 and the patch was 2.6.37.6-3

Here's a list of Slackware versions (back to 7.0... I didn't check further) that saw patched releases of the same kernel version:
  • 14.1 (64bit only): 3.10.17 -> 3.10.17-2
  • 13.37: 2.6.37.6 -> 2.6.37.6-3
  • 13.1: 2.6.33.4 -> 2.6.33.4-2
  • 13.0: 2.6.26.9 -> 2.6.26.6-3
  • 12.0: 2.6.21.5 -> 2.6.21.5 (build #2)

These are the versions of Slackware that saw a completely new kernel version in their patches (thanks for having me look at this... I've updated the wikipedia version table to show the patched version as well as the release version):
  • 14.2: 4.4.14 -> 4.4.19
  • 14.0: 3.2.29 -> 3.2.45
  • 12.2: 2.6.27.7 -> 2.6.27.31
  • 9.1: 2.4.22 -> 2.4.26
  • 9.0: 2.4.20 -> 2.4.21
 
1 members found this post helpful.
Old 08-24-2016, 11:26 PM   #9
Wiser Slacker
Member
 
Registered: May 2014
Location: germany
Distribution: slackware x86_64 , arm , slackware , AlmaLinux
Posts: 83

Rep: Reputation: Disabled
where is the problem with changing the current kernel - if pat thinks one should change it because of this security patch - you just should do it !

i change mine when ever i want to do it ...

and - yes - slackware is a binary distribution witch is a one man show of pat ...
so - you should not think that you are being able to build your own distribution just by recompiling all the sources with these buildscripts ... there are some magic's more to do ... lol

no that's not sarcastic - i think i do understand because i have try it by myself ...
W.Slacker

but i hope that someday we could help him a little bit more to rip out the smal bugs
 
Old 08-25-2016, 06:47 AM   #10
bassmadrigal
LQ Guru
 
Registered: Nov 2003
Location: West Jordan, UT, USA
Distribution: Slackware
Posts: 8,792

Rep: Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656Reputation: 6656
Quote:
Originally Posted by Wiser Slacker View Post
where is the problem with changing the current kernel - if pat thinks one should change it because of this security patch - you just should do it !
It's just that on a stable release, Pat does not commonly update the kernel. In 19 releases, only 10 of them saw kernel upgrades, and of those 10, only 5 were completely new versions. For those of us who've been with Slackware for a long time, we know it's not common to receive a completely new kernel version. For those who are not very familiar with Linux and/or Slackware, upgrading the kernel might be a bit daunting since bootloaders have to be updated as well (since if you screw up updating your bootloader, your computer likely won't boot without some work).
 
3 members found this post helpful.
Old 08-26-2016, 12:17 PM   #11
NakedRider
Member
 
Registered: Nov 2008
Location: Sacramento, CA
Distribution: Slackware and only Slackware
Posts: 194

Rep: Reputation: 114Reputation: 114
I've made the change

I've updated to 4.4.19 without any problems.
 
Old 08-27-2016, 01:50 PM   #12
jonathan018
LQ Newbie
 
Registered: May 2011
Posts: 16

Rep: Reputation: 2
Updating to 4.4.19 give me notorious "flooding by EDID errors", with blinking screen every 10 seconds. Curiously, blinking was present even with " drm_kms_helper.edid_firmware " appended , so I reverted to 4.4.14. Is there a way to fix that by correcting the monitor, not bypassing errors ?
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Slackware 10.1 kernel upgrade from 2.4.29 to 2.6 aysmir Linux - Server 2 12-19-2008 03:12 PM
Can I remove old kernel sources after kernel upgrade(to 2.6.17.13) on Slackware 11? ErV Slackware 7 05-04-2007 12:06 PM
Slackware 11 kernel upgrade help misterjingo Slackware 8 02-09-2007 11:33 AM
Slackware Kernel upgrade carlosinfl Slackware 8 06-18-2005 12:33 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 05:08 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration