[1922] in SIPB_Linux_Development
Re: Erik Troan: SECURITY: 2.0.32 kernel now available
daemon@ATHENA.MIT.EDU (Derek Atkins)
Fri Nov 21 10:30:45 1997
To: Erik Nygren <nygren@MIT.EDU>
Cc: linux-dev@MIT.EDU
From: Derek Atkins <warlord@MIT.EDU>
Date: 21 Nov 1997 10:29:02 -0500
In-Reply-To: Erik Nygren's message of Thu, 20 Nov 1997 17:31:35 EST
Well, I made Linux-AFS 2.0.32 packages. They are available in the
canonical location. However, I haven't read the 'upgrade' procedures,
yet, so I don't know how difficult it would be for someone to upgrade
the kernel (using RPM) on an existing machine.
-derek
Erik Nygren <nygren@MIT.EDU> writes:
>
>
> FYI. Once we have AFS packages available for 2.0.32
> we might want to make this the kernel people use for both 4.0 and 4.2.
>
> Erik
>
> ------- Forwarded Message
>
> Received: from SOUTH-STATION-ANNEX.MIT.EDU by po7.MIT.EDU (5.61/4.7) id AA21105; Thu, 20 Nov 97 17:27:29 EST
> Received: from mail2.redhat.com by MIT.EDU with SMTP
> id AA06557; Thu, 20 Nov 97 17:27:11 EST
> Received: (qmail 28267 invoked by uid 501); 20 Nov 1997 22:22:58 -0000
> Resent-Date: 20 Nov 1997 22:22:58 -0000
> Resent-Cc: recipient.list.not.shown:;@redhat.com
> Mbox-Line: From redhat-announce-list-request@redhat.com Thu Nov 20 17:22:45 1997
> Date: Thu, 20 Nov 1997 17:22:27 -0500 (EST)
> From: Erik Troan <ewt@redhat.com>
> Reply-To: redhat-list@redhat.com
> To: redhat-announce-list@redhat.com
> Subject: SECURITY: 2.0.32 kernel now available
> Message-Id: <Pine.LNX.3.95.971120171752.14072B-100000@lacrosse.redhat.com>
> Approved: ewt@redhat.com
> Mime-Version: 1.0
> Content-Type: TEXT/PLAIN; charset=US-ASCII
> Resent-Message-Id: <"dyRpl3.0.cm6.rWBTq"@mail2.redhat.com>
> Resent-From: redhat-announce-list@redhat.com
> X-Mailing-List: <redhat-announce-list@redhat.com> archive/latest/659
> X-Loop: redhat-announce-list@redhat.com
> Precedence: list
> Resent-Sender: redhat-announce-list-request@redhat.com
> X-Url: http://www.redhat.com
>
> - -----BEGIN PGP SIGNED MESSAGE-----
>
>
> There are two security holes in all of the Linux 2.0.x kernels shipped
> to date with Red Hat, both of which have been well publicized.
>
> The most important concerns how IP fragments are reassembled by the
> kernel. An attack can exploit this problem, causing a complete machine
> freeze. This has been dubbed the 'teardrop' attack.
>
> The other is the Pentium f00f freezeup, which allows any user mode
> process to hang Pentium, Pentium Overdrive, and Pentium MMX processors.
>
> The 2.0.32 kernel includes fixes for these problems, and is available
> for Red Hat 4.0, 4.1, and 4.2 on the Intel platforms. As upgrading a
> kernel is tricky, we urge you to read the information on using these
> packages available from:
>
> http://www.redhat.com/support/docs/rhl/intel/kernel-upgrade-intel.html
>
> to enourage the use of these instructions, I'm not going to post the
> full URL's of the packages here. The above URL references the Red Hat
> 4.2 Errata, which contains links to the packages. As always, those
> packages have been signed with the Red Hat PGP key.
>
> Erik
>
> - -----BEGIN PGP SIGNATURE-----
> Version: 2.6.2
>
> iQCVAwUBNHS4KKUg6PHLopv5AQHjYQQAmpS3X6AoXjvVW/kdLuRjv6by1sWL6TlG
> BYvbrgczOTiTui+Xf0AAvxS1pHIXlP3xQV8Fl+4Fkzr1HUIftqNVhUyQbgOe154i
> pmFZsi7Yh9azQ5/uyYtnzB2m5aULLXuZjMcc/ItoQSyhGIzBB4fHePhnB/ls+hdh
> 1iZ7Y9VLNDk=
> =MZA0
> - -----END PGP SIGNATURE-----
>
> - --
> To unsubscribe:
> mail -s unsubscribe redhat-announce-list-request@redhat.com < /dev/null
>
>
> ------- End of Forwarded Message
>
--
Derek Atkins, SB '93 MIT EE, SM '95 MIT Media Laboratory
Member, MIT Student Information Processing Board (SIPB)
URL: http://web.mit.edu/warlord/ PP-ASEL N1NWH
warlord@MIT.EDU PGP key available