[Triumf-linux-managers] vulnerability in SL-5 64-bit kernel
Kelvin Raywood
kray at triumf.ca
Fri Sep 17 16:15:08 PDT 2010
This is an important security message to all managers of Linux machines
at TRIUMF.
A privilege-escalation vulnerability in the 64-bit version of the Linux
kernel has been identified and an exploit that abuses it is publicly
available. All 64-bit RedHat Enterprise-Linux 5 kernels and thus
Scientific-Linux 5 systems are vulnerable.
Not affected: 32-bit systems, Scientific-Linux 4 and earlier
This vulnerability can only be exploited by someone who can already
login as a normal user. However the recent incident involving ibm00 and
many other Linux machines at TRIUMF reminds us that it only takes one
compromised account to expose the passwords of many users.
RedHat have not yet released a fixed kernel, but the vulnerability can
be nullified by disabling execution of 32-bit binaries on 64-bit
systems. I have created an rpm to do this and added it to the TRIUMF
rpm repository.
The TRIUMF Computing Security Committee recommends that you install this
on all 64-bit SL-5 systems that you manage. Install with:
yum install triumf-disable-elf32
With this package installed, 32-bit binaries such as acroread or
flash-plugin will not run. If you start them from a terminal, the
message "32-bit binaries are disabled" will be printed. This can be a
serious inconvenience but there are usually alternatives and it is
likely that a fixed kernel will be available by Monday.
More info at: https://access.redhat.com/kb/docs/DOC-40265
--
Kel Raywood
TRIUMF Computing Security Committee
More information about the Triumf-linux-managers
mailing list