Hi Stephan,
I took yours and changed a few times and made my own. I haven't put it
into testing yet, but here is what I have.
http://home.fnal.gov/~dawson/test/SL_fix_bad_km.sh
http://home.fnal.gov/~dawson/test/SL_fix_bad_km-1.0-1.noarch.rpm
http://home.fnal.gov/~dawson/test/SL_fix_bad_km-1.0-1.src.rpm
Basically it goes through a list of modules.
If the module is already loaded,
it first tries to stop the service if it knows how (such as bluetooth
and irda)
If the modules is still loaded, it tries "modprobe -r"
If the module is still loaded it tried "rmmod"
It then uses your find script, finds all the offending kernel modules,
and moves them to a safe directory. We do this instead of just removing
them.
We have all the output going to an log file, and send a nice email,
saying what we did, to root.
I'm sorry it's taken me so long to get this out, but there was various
testing and talking along the way.
Troy
Stephan Wiesand wrote:
Here's a stab at an SL_rpm to help mitigate the issue for the time
being:
http://www-zeuthen.desy.de/~wiesand/ww/
It will remove(!) the suspicious modules for all kernels on the system,
even those installed later on. It then checks whether one of them is
loaded, and sends mail to root if it is.
Use at your own risk! Any bugs in the script, and this could irreparably
damage your OS installation. Comments very welcome.
- Stephan
On Fri, 2009-08-14 at 15:40 +0200, Matthias Schroeder wrote:
Troy Dawson wrote:
Stephan Wiesand wrote:
On Fri, 2009-08-14 at 11:59 +0100, Dr Andrew C Aitchison wrote:
On Fri, 14 Aug 2009, Urs Beyerle wrote:
I guess SL is affected like most other Linux distributions.
I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
should prevent an exploit.
# sysctl vm.mmap_min_addr=4096
The default on my SL53 machines appears to be 65536
so there may be no need to do this.
And Stephan Wiesand <[email protected]> replied:
I successfully rooted a 32bit SL5 system with SELinux enabled
and vm.mmap_min_addr=64k with the public exploit :-(
Did this machine have kernel-2.6.18-128.4.1.el5 and hence the
fix for CVE-2009-1895 which allows a user to bypass mmap_min_addr - see
Yes.
https://rhn.redhat.com/errata/RHSA-2009-1193.html ?
Though I did see that there are other ways of bypassing
vm.mmap_min_addr :-(
Yes, and they work fine :-/
Has anyone with a TAM with RedHat reported this to them yet?
You mean
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2692, right?
I'm pretty sure someone has, I just want to verify and get a bug
tracking number.
There is also an IT, you should be able to see it.
Matthias
Troy
--
__________________________________________________
Troy Dawson [email protected] (630)840-6468
Fermilab ComputingDivision/LCSI/CSI LMSS Group
__________________________________________________