Re: [CentOS] Heads up on local root escalation
Am 15.05.2014 um 11:22 schrieb Leon Fauster leonfaus...@googlemail.com: Am 15.05.2014 um 07:23 schrieb Eero Volotinen eero.voloti...@iki.fi: 2014-05-12 21:13 GMT+03:00 James Hogarth james.hoga...@gmail.com: Remember to be especially aware if you have systems that can potentially have code uploaded and run (ftp to httpd vhost or improper php config and file ownership/permissions). This does not affect el5 ... an el6 update is pending. https://access.redhat.com/security/cve/CVE-2014-0196 This issue does not affect the versions of Linux kernel packages as shipped with Red Hat Enterprise Linux 6.4 EUS and Red Hat Enterprise Linux 6, because they include backport of upstream commit c56a00a165 that mitigates this issue. cite: This issue does affect the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux 6.2 AUS, Red Hat Enterprise Linux 6.3 EUS and Red Rat Enterprise MRG 2, and we are currently working on corrected kernel packages that address this issue. https://rhn.redhat.com/errata/RHSA-2014-0512.html -- LF ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
Am 15.05.2014 um 07:23 schrieb Eero Volotinen eero.voloti...@iki.fi: 2014-05-12 21:13 GMT+03:00 James Hogarth james.hoga...@gmail.com: Remember to be especially aware if you have systems that can potentially have code uploaded and run (ftp to httpd vhost or improper php config and file ownership/permissions). This does not affect el5 ... an el6 update is pending. https://access.redhat.com/security/cve/CVE-2014-0196 This issue does not affect the versions of Linux kernel packages as shipped with Red Hat Enterprise Linux 6.4 EUS and Red Hat Enterprise Linux 6, because they include backport of upstream commit c56a00a165 that mitigates this issue. cite: This issue does affect the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux 6.2 AUS, Red Hat Enterprise Linux 6.3 EUS and Red Rat Enterprise MRG 2, and we are currently working on corrected kernel packages that address this issue. -- LF ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
On 05/15/2014 09:22 PM, Leon Fauster wrote: cite: This issue does affect the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux 6.2 AUS, Red Hat Enterprise Linux 6.3 EUS and Red Rat Enterprise MRG 2, and we are currently working on corrected kernel packages that address this issue. That should not be an issue for CentOS as CentOS does not support old point releases. The simple answer is if you update to the latest 6.x you are not vulnerable. RedHat has to address this because they do have support for staying on a particular point release. Peter ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
Am 15.05.2014 um 12:31 schrieb Peter pe...@pajamian.dhs.org: On 05/15/2014 09:22 PM, Leon Fauster wrote: cite: This issue does affect the versions of the Linux kernel packages as shipped with Red Hat Enterprise Linux 6.2 AUS, Red Hat Enterprise Linux 6.3 EUS and Red Rat Enterprise MRG 2, and we are currently working on corrected kernel packages that address this issue. That should not be an issue for CentOS as CentOS does not support old point releases. The simple answer is if you update to the latest 6.x you are not vulnerable. RedHat has to address this because they do have support for staying on a particular point release. Peter, sure I am with you. Anyway, to complete the big picture its just an additional information and BTW I know people staying on older point releases for various reasons. There are several scenarios in the wild :-) -- LF ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
On 12/05/14 22:11, Keith Keller wrote: On 2014-05-12, Akemi Yagi amy...@gmail.com wrote: According to the upstream BZ 1094232, there is a patch from kernel.org: https://git.kernel.org/cgit/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linusid=4291086b1f081b869c6d79e5b7441633dc3ace00 Actually, I was wondering about mitigation along the lines of blacklisting a module, tuning a sysctl parameter, or some other mitigation that wouldn't require a new kernel. Perhaps such mitigation isn't even possible with this issue. --keith Not specific to this issue, but you might like to look at TPE (kmod-tpe) available at elrepo.org. http://elrepo.org/tiki/kmod-tpe Trusted Path Execution (TPE) is a kernel module that prevents users from executing programs that are not owned by root, or are writable. This effectively blocks users (or compromised accounts) from executing code to exploit vulnerabilities such as this. For example, taken from the README: * Trusted Path Execution; deny execution of non-root owned or writable binaries $ gcc -o exploit exploit.c $ chmod 755 exploit $ ./exploit -bash: ./exploit: Permission denied $ dmesg | tail -n1 [tpe] Denied untrusted exec of /home/corey/exploit (uid:500) by /bin/bash (uid:500), parents: /usr/sbin/sshd (uid:500), /usr/sbin/sshd (uid:0), /sbin/init (uid:0). Deny reason: directory uid not trusted ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
This issue does not affect the versions of Linux kernel packages as shipped with Red Hat Enterprise Linux 6.4 EUS and Red Hat Enterprise Linux 6, because they include backport of upstream commit c56a00a165 that mitigates this issue. 2014-05-12 21:13 GMT+03:00 James Hogarth james.hoga...@gmail.com: Remember to be especially aware if you have systems that can potentially have code uploaded and run (ftp to httpd vhost or improper php config and file ownership/permissions). This does not affect el5 ... an el6 update is pending. https://access.redhat.com/security/cve/CVE-2014-0196 ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
On 12 May 2014 22:15, Keith Keller kkel...@wombat.san-francisco.ca.us wrote: Actually, I was wondering about mitigation along the lines of blacklisting a module, tuning a sysctl parameter, or some other mitigation that wouldn't require a new kernel. Perhaps such mitigation isn't even possible with this issue. Yeah I've not seen any mitigations that would work for CentOS. I wonder if a systemtap module would be feasible like that one a few months or so ago. For the time being I guess that doubly vigilant is important. ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
Am 12.05.2014 um 20:58 schrieb Akemi Yagi amy...@gmail.com: On Mon, May 12, 2014 at 11:23 AM, Keith Keller Are there any mitigation steps we can take? I've chased down some of the links looking for any, but haven't had success yet. According to the upstream BZ 1094232, there is a patch from kernel.org: https://git.kernel.org/cgit/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linusid=4291086b1f081b869c6d79e5b7441633dc3ace00 The file to patch in the RHEL/CentOS kernel seems to be drivers/char/n_tty.c If the next kernel update does not have the fix, I can add it to the centosplus kernel. Hi Akemi, this would be great - can we push this out? Upstream is delayed (for such vuln). -- Thanks LF ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
On Tue, May 13, 2014 at 2:05 AM, Leon Fauster leonfaus...@googlemail.com wrote: Am 12.05.2014 um 20:58 schrieb Akemi Yagi amy...@gmail.com: On Mon, May 12, 2014 at 11:23 AM, Keith Keller Are there any mitigation steps we can take? I've chased down some of the links looking for any, but haven't had success yet. According to the upstream BZ 1094232, there is a patch from kernel.org: https://git.kernel.org/cgit/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linusid=4291086b1f081b869c6d79e5b7441633dc3ace00 The file to patch in the RHEL/CentOS kernel seems to be drivers/char/n_tty.c If the next kernel update does not have the fix, I can add it to the centosplus kernel. Hi Akemi, this would be great - can we push this out? Upstream is delayed (for such vuln). It would help if you file an RFE at http://bugs.centos.org under the category CentOS-6-Plus. Akemi ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
On 2014-05-12, James Hogarth james.hoga...@gmail.com wrote: This does not affect el5 ... an el6 update is pending. https://access.redhat.com/security/cve/CVE-2014-0196 Are there any mitigation steps we can take? I've chased down some of the links looking for any, but haven't had success yet. --keith -- kkel...@wombat.san-francisco.ca.us ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
On Mon, May 12, 2014 at 11:23 AM, Keith Keller kkel...@wombat.san-francisco.ca.us wrote: On 2014-05-12, James Hogarth james.hoga...@gmail.com wrote: This does not affect el5 ... an el6 update is pending. https://access.redhat.com/security/cve/CVE-2014-0196 Are there any mitigation steps we can take? I've chased down some of the links looking for any, but haven't had success yet. According to the upstream BZ 1094232, there is a patch from kernel.org: https://git.kernel.org/cgit/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linusid=4291086b1f081b869c6d79e5b7441633dc3ace00 The file to patch in the RHEL/CentOS kernel seems to be drivers/char/n_tty.c If the next kernel update does not have the fix, I can add it to the centosplus kernel. Akemi ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos
Re: [CentOS] Heads up on local root escalation
On 2014-05-12, Akemi Yagi amy...@gmail.com wrote: According to the upstream BZ 1094232, there is a patch from kernel.org: https://git.kernel.org/cgit/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linusid=4291086b1f081b869c6d79e5b7441633dc3ace00 Actually, I was wondering about mitigation along the lines of blacklisting a module, tuning a sysctl parameter, or some other mitigation that wouldn't require a new kernel. Perhaps such mitigation isn't even possible with this issue. --keith -- kkel...@wombat.san-francisco.ca.us ___ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos