Simon Horman [Horms]
2004-04-22 11:55:39 UTC
Updated kernel packages for are available for Ultra Monkey 2.0.1 to fix
the following a bug in setsockopt[1] which could result in a local user
escelating their privellages to root.
This effects the Kernels provided for Debian Woody, Debian Sid, Fedora
Core 1 and Red Hat Enterprise Linux 3.0. It does not effect the kernels
provided for Red Hat 7.3, 8 and 9.
The updated kernels for Debian Woody, Debian Sid also resolve a serious
packaging error wherby the previous release
(2.4.22-1-ipvs_2.4.22-7woody.um.1/2.4.22-1-ipvs_2.4.22-7.um.1)[2] did
not
include the patches advised. Appologies for this error.
__Packages are currently being uploaded. Please be patient___
Debian Woody (Stable 3.0) [2.4.22-1-ipvs_2.4.22-7woody.um.2]:
download: http://www.ultramonkey.org/download/2.0.1/debian.woody/
notes:
http://www.ultramonkey.org/2.0.1/installation-debian.woody.html
Debian Sid [2.4.22-1-ipvs_2.4.22-7.um.2]:
download: http://www.ultramonkey.org/download/2.0.1/debian.sid/
notes: http://www.ultramonkey.org/2.0.1/installation-debian.sid.html
Fedora Core 1 [2.4.22-1.2179.nptl.um.2]:
download: http://www.ultramonkey.org/download/2.0.1/fr.c.1/
notes: http://www.ultramonkey.org/2.0.1/installation-fr.c.1.html
Red Hat Enterprise Linux 3.0 [2.4.21-9.0.1.EL.um.3]:
download: http://www.ultramonkey.org/download/2.0.1/rh.el.3.0.ws/
notes: http://www.ultramonkey.org/2.0.1/installation-rh.9.html
This announcement is available at
http://www.ultramonkey.org/news_archive.shtml#2004042200
References:
[1] http://isec.pl/vulnerabilities/isec-0015-msfilter.txt
[2] http://www.ultramonkey.org/news_archive.shtml#2004041600
the following a bug in setsockopt[1] which could result in a local user
escelating their privellages to root.
This effects the Kernels provided for Debian Woody, Debian Sid, Fedora
Core 1 and Red Hat Enterprise Linux 3.0. It does not effect the kernels
provided for Red Hat 7.3, 8 and 9.
The updated kernels for Debian Woody, Debian Sid also resolve a serious
packaging error wherby the previous release
(2.4.22-1-ipvs_2.4.22-7woody.um.1/2.4.22-1-ipvs_2.4.22-7.um.1)[2] did
not
include the patches advised. Appologies for this error.
__Packages are currently being uploaded. Please be patient___
Debian Woody (Stable 3.0) [2.4.22-1-ipvs_2.4.22-7woody.um.2]:
download: http://www.ultramonkey.org/download/2.0.1/debian.woody/
notes:
http://www.ultramonkey.org/2.0.1/installation-debian.woody.html
Debian Sid [2.4.22-1-ipvs_2.4.22-7.um.2]:
download: http://www.ultramonkey.org/download/2.0.1/debian.sid/
notes: http://www.ultramonkey.org/2.0.1/installation-debian.sid.html
Fedora Core 1 [2.4.22-1.2179.nptl.um.2]:
download: http://www.ultramonkey.org/download/2.0.1/fr.c.1/
notes: http://www.ultramonkey.org/2.0.1/installation-fr.c.1.html
Red Hat Enterprise Linux 3.0 [2.4.21-9.0.1.EL.um.3]:
download: http://www.ultramonkey.org/download/2.0.1/rh.el.3.0.ws/
notes: http://www.ultramonkey.org/2.0.1/installation-rh.9.html
This announcement is available at
http://www.ultramonkey.org/news_archive.shtml#2004042200
References:
[1] http://isec.pl/vulnerabilities/isec-0015-msfilter.txt
[2] http://www.ultramonkey.org/news_archive.shtml#2004041600
--
$B%5%$%b%s!&%[!<%^%s(B ($B@>Lg(B $BJuRX(B) | Simon Horman (Horms)
$B%5%$%b%s!&%[!<%^%s(B ($B@>Lg(B $BJuRX(B) | Simon Horman (Horms)