[Triumf-linux-managers] Re: vulnerability in SL-5 64-bit kernel

Kelvin Raywood kray at triumf.ca
Wed Sep 22 10:36:33 PDT 2010


*IMPORTANT* If you manage one or more 64-bit SL-5 machines then please 
read this message.

RedHat released an updated SL-5 kernel that fixes the 
privilege-escalation vulnerability that was reported last week.  The new 
version is

     kernel-2.6.18-194.11.4.el5

and is now on our mirror for all SL-5 versions.  However, it was not on 
our mirror overnight so not installed by the nightly update. You can 
update manually with

     yum clean metadata
     yum update
     reboot

If you disabled execution of 32-binaries with triumf-disable-elf32, then 
once the new fixed kernel is running you can re-enable them by 
removing the rpm.

     yum remove triumf-disable-elf32

Alternately, before rebooting you can disable the service.

     chkconfig triumf-disable-elf32 off

If you rebooted before doing this, then stop the service manually.

     service triumf-disable-elf32 stop

This vulnerability is widely known and easy to exploit so it has been 
deemed critical by the LHC-Computing-Grid security team.  I have 
forwarded their message below.  You'll note that they will boot sites 
off the grid that don't update their machines within a week.

If you manage a 64-bit SL-5 machines that has multiple users then the 
TRIUMF Computer-Security Committee feels that it is imperative that you 
either install triumf-disable-elf32, or update the kernel and reboot. If 
you don't do either of these, then it is your responsibility to inform 
your users that their account and password are at risk of being captured 
if any user on the system has a weak password or an account that has 
been comprimised in some other way.  In particular:

* Don't ssh into a vulnerable machine using a password; use only an 
ssh-key.

* Don't ssh from a vulnerable machine to anywhere else.

--
Kel Raywood
TRIUMF Computer Security Committee


--Begin Forwarded Message--

>From nixon at nsc.liu.se Wed Sep 22 07:43:48 2010
Date: Wed, 22 Sep 2010 16:42:54 +0200
From: Leif Nixon <nixon at nsc.liu.se>
To: site-security-contacts at mailman.egi.eu
Subject: [Site-Security-Contacts] Mandatory updates for critical vulnerability CVE-2010-3081 [TLP:GREEN]

** GREEN information - Community wide distribution allowed                  **
** see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions **

Dear site security contacts,

Offical updates that fix the recent CVE-2010-3081 vulnerability are now
available, see references below.

You are asked to please update all worker nodes, login servers and other
user-accessible systems as soon as possible.

Since this vulnerability has been classified as critical by the EGI 
CSIRT, there is a *seven day deadline* to update your systems. This 
means your systems must be updated by September 29 21:00 UTC (23:00 
CEST).

Failure to do so may ultimately lead to site suspension.

Naturally, if you have already fixed the vulnerability by e.g. compiling
your own patched kernel or installing the previously announced SLC5
update kernel from the testing repository, you need not take any further
action.


References:

SLC5: http://linux.web.cern.ch/linux/news.shtml#cve20103081-Sept22

SL5: http://ftp.scientificlinux.org/linux/scientific/5x/x86_64/updates/security/repoview/kernel.html

Red Hat: https://rhn.redhat.com/errata/RHSA-2010-0704.html

CentOS: http://lists.centos.org/pipermail/centos-announce/2010-September/017019.html

Fedora: http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047943.html

Debian: http://www.debian.org/security/2010/dsa-2110

Ubuntu: http://www.ubuntu.com/usn/usn-988-1

Background information: https://access.redhat.com/kb/docs/DOC-40265

-- 
Leif Nixon - EGI CSIRT

_______________________________________________
Site-Security-Contacts mailing list
Site-Security-Contacts at mailman.egi.eu
https://mailman.egi.eu/mailman/listinfo/site-security-contacts


More information about the Triumf-linux-managers mailing list