[Triumf-linux-managers] kernel vulnerability
Kelvin Raywood
kray at triumf.ca
Fri Aug 14 15:47:23 PDT 2009
This is an important security message to all managers of Linux machines
at TRIUMF.
A vulnerability in the Linux kernel (CVE-2009-2692) that allows
a local user to gain root privileges on the machine has been identified
and an exploit that abuses the bug is publicly available.
Note this vulnerability can only be exploited by someone who can already
login as a normal user. If you are concerned about this, then you
should follow one of the following recommendations.
More info and a work-around recommended by RedHat until they fix the
kernel is available at:
[ https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2692#c10 ].
The vulnerability is restricted to bluetooth and ppp kernel modules and
the recommended work-around just ensures that those modules will not be
loadable. However, if one of the modules is already loaded then they
will need to be manually unloaded before the work-around is effective.
You can check with:
lsmod | grep -E 'blue|ppp'
On ScientificLinux-4.5 or later that was installed by a TRIUMF
kickstart, then the RedHat fix can be applied bu installing a new triumf
rpm with:
yum install triumf-disable-vul_kmod
Since this rpm has only just been uploaded you may find it necessary to
do "yum clean metadata" to ensure that it is available.
The issue has also been discussed on the ScientificLinux mailing-list.
The SL maintainers have created an rpm that takes a different approach
to disabling the kernel-modules by removing them from the kernel trees.
The SL rpms should reach the TRIUMF mirror this evening an will be
installable with:
yum install SL_fix_bad_km
Kel Raywood
Core Computing and Networking
TRIUMF
More information about the Triumf-linux-managers
mailing list