Slackware-13.0 ChangeLog (2009-08-18)

Tue Aug 18 18:50:46 CDT 2009

Patched kernels and kernel packages for Linux 2.6.29.6 to address
a bug in proto_ops structures which could allow a user to use the
kernel sendpage operation to execute arbitrary code in page zero.
This could allow local users to gain escalated privileges.
This flaw was discovered by Tavis Ormandy and Julien Tinnes of the
Google Security Team.
For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692
In addition, these kernels change the CONFIG_SECURITY_DEFAULT_MMAP_MIN_ADDR
kernel config option value to 4096, which should prevent the execution
of arbitrary code by future NULL dereference bugs that might be found
in the kernel. If you are compiling your own kernel, please check this
option in your .config. If it is set to =0, you may wish to edit it
to 4096 (or some other value > 0) and then reconfigure, or the kernel
will not have default protection against zero page attacks from
userspace.
(* Security fix *)
  • news/2009/08/18/slackware-13.0-changelog.txt
  • Last modified: 4 years ago
  • by Giuseppe Di Terlizzi