Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 23 Nov 2004 07:42:15 +0300
From: Solar Designer <solar@...nwall.com>
To: announce@...ts.openwall.com, owl-users@...ts.openwall.com
Cc: lwn@....net
Subject: Linux 2.4.28-ow1 is out

Hi,

I've released Linux 2.4.28-ow1 a few days ago.  (Apologies for the
delayed announcement.)

Linux 2.4.28, and thus 2.4.28-ow1, fixes a number of security-related
bugs, including the ELF loader vulnerabilities discovered by Paul
Starzetz (confirmed: ability for users to read +s-r binaries;
potential: local root), a race condition with reads from Unix domain
sockets (potential local root), smbfs support vulnerabilities
discovered by Stefan Esser (confirmed: remote DoS by a malicious smbfs
server; potential: remote root by a malicious smbfs server).  More
information on these vulnerabilities can be found here:

	http://isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt
	http://marc.theaimsgroup.com/?l=bugtraq&m=110091183206580
	http://security.e-matters.de/advisories/142004.html

The updated patch is available at:

	http://www.openwall.com/linux/

Owl-current and Owl 1.1-stable have been updated to include Linux
2.4.28-ow1 as the recommended kernel.

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ