On Thu, 16 May 2013, Pat Riehecky wrote:

Synopsis:          Important: kernel security update
Advisory ID:       SLSA-2013:0830-1
Issue Date:        2013-05-16
CVE Numbers:       CVE-2013-2094

This update fixes the following security issue:

* It was found that the Scientific Linux 6.1 kernel update
(SLSA-2011:0542) introduced an integer conversion issue in the Linux
kernel's Performance Events implementation. This led to a user-supplied
index into the perf_swevent_enabled array not being validated properly,
resulting in out-of-bounds kernel memory access. A local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2013-2094,
Important)

A public exploit that affects Scientific Linux 6 is available.

Refer to Red Hat Knowledge Solution 373743 for further information
and mitigation instructions for users who are unable to immediately
apply this update.

Thanks for the quick response Pat; I have tested the new kernel, and
can confirm that it prevents the exploit from working (potty-mouth
output edited out):


### older kernel:
$ uname -r
2.6.32-358.2.1.el6.x86_64

$ /sbin/sysctl kernel.perf_event_paranoid kernel.perf_event_paranoid = 1

$ ./perf_events 2.6.37-3.x x86_64
sd@*ucksheep.org 2010
-sh-4.1# id
uid=0(root) gid=0(root) groups=0(root),..


### this errata:
$ uname -r
2.6.32-358.6.2.el6.x86_64

$ /sbin/sysctl kernel.perf_event_paranoid kernel.perf_event_paranoid = 1

$ ./perf_events perf_events: perf_events2.c:51: sheep: Assertion `!close(fd)' failed.
Aborted

cheers, etc.
--
deatrich @ triumf.ca, Science/ATLAS         PH: +1 604-222-7665
<*> This moment's fortune cookie:
The best laid plans of mice and men are held up in the legal department.

Reply via email to