whats this new exploit then? (2009/11/03)

2009-11-04 Thread Faye Gibbins

Hi,

 Any comment from the SL5 distro  maintainers on this exploit 
apparently in recent RHEL releases?


http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

Faye
--

-
Faye Gibbins, Computing Officer (Infrastructure Services)
 GeoS KB; Linux, Unix, Security and Networks.
Beekeeper  - The Apiary Project, KB -   www.bees.ed.ac.uk
-

  I grabbed at spannungsbogen before I knew I wanted it.
 (x(x_(X_x(O_o)x_x)_X)x)

The University of Edinburgh is a charitable body,
registered in Scotland, with registration number SC005336.


Re: whats this new exploit then? (2009/11/03)

2009-11-04 Thread Steven Timm

Email from Troy yesterday indicated that SL will have this patch available
soon, within the next couple of days.

Steve


On Wed, 4 Nov 2009, Faye Gibbins wrote:


Hi,

Any comment from the SL5 distro  maintainers on this exploit apparently in 
recent RHEL releases?


http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

Faye



--
--
Steven C. Timm, Ph.D  (630) 840-8525
t...@fnal.gov  http://home.fnal.gov/~timm/
Fermilab Computing Division, Scientific Computing Facilities,
Grid Facilities Department, FermiGrid Services Group, Assistant Group Leader.


Re: whats this new exploit then? (2009/11/03)

2009-11-04 Thread Troy Dawson

Recent RHEL releases?
No, not recent ... all

We already have the kernels all built, and are working on the dependencies.

Troy

Faye Gibbins wrote:

Hi,

  Any comment from the SL5 distro  maintainers on this exploit 
apparently in recent RHEL releases?


http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

Faye



--
__
Troy Dawson  daw...@fnal.gov  (630)840-6468
Fermilab  ComputingDivision/LSCS/CSI/USS Group
__


Re: whats this new exploit then? (2009/11/03)

2009-11-04 Thread Stephen John Smoogen
On Wed, Nov 4, 2009 at 1:14 AM, Faye Gibbins
fgibb...@staffmail.ed.ac.uk wrote:
 Hi,

  Any comment from the SL5 distro  maintainers on this exploit apparently in
 recent RHEL releases?

The vulnerability has been there for a long time. It has only just
been found by someone who works on the kernel. The finders comments
are a bit off.. he first states that its a Red Hat problem and then
mentions that people who are going to be using various applications
would have to turn it off anyway.

My guess is that the SL people will have the updated kernels out as
soon as they are tested.

 http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/

 Faye
 --

 -
 Faye Gibbins, Computing Officer (Infrastructure Services)
     GeoS KB; Linux, Unix, Security and Networks.
 Beekeeper  - The Apiary Project, KB -   www.bees.ed.ac.uk
 -

  I grabbed at spannungsbogen before I knew I wanted it.
                 (x(x_(X_x(O_o)x_x)_X)x)

 The University of Edinburgh is a charitable body,
 registered in Scotland, with registration number SC005336.




-- 
Stephen J Smoogen.

Ah, but a man's reach should exceed his grasp. Or what's a heaven for?
-- Robert Browning


Re: whats this new exploit then? (2009/11/03)

2009-11-04 Thread Stephan Wiesand

Hi Troy,

On Nov 4, 2009, at 16:24, Troy Dawson wrote:


Recent RHEL releases?
No, not recent ... all


right. But for SL4 with the latest kernel (-98.0.15), it's just DOS  
*if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is  
not the default. SL5 with SELinux *dis*abled is safe as well, but if  
SELinux is enforcing or permissive it's not, and nor is SL3.


If you have trouble getting all those kernels  modules  dependencies  
out today, could your try to do SL5 first, then SL3, and then SL4?


Thanks,
Stephan

We already have the kernels all built, and are working on the  
dependencies.


Troy

Faye Gibbins wrote:

Hi,
 Any comment from the SL5 distro  maintainers on this exploit  
apparently in recent RHEL releases?

http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
Faye



--
__
Troy Dawson  daw...@fnal.gov  (630)840-6468
Fermilab  ComputingDivision/LSCS/CSI/USS Group
__


--
Stephan Wiesand
  DESY - DV -
  Platanenallee 6
  15738 Zeuthen, Germany


Re: whats this new exploit then? (2009/11/03)

2009-11-04 Thread Troy Dawson

Stephan Wiesand wrote:

Hi Troy,

On Nov 4, 2009, at 16:24, Troy Dawson wrote:


Recent RHEL releases?
No, not recent ... all


right. But for SL4 with the latest kernel (-98.0.15), it's just DOS  
*if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is  
not the default. SL5 with SELinux *dis*abled is safe as well, but if  
SELinux is enforcing or permissive it's not, and nor is SL3.


If you have trouble getting all those kernels  modules  dependencies  
out today, could your try to do SL5 first, then SL3, and then SL4?




Well, the building isn't the hard part, that's all done now for all of 
them, and I believe I'll be able to get SL3 and SL4 out today.


SL5 is going to go into testing today, with the expectation that it will 
go into the main update on monday.


Why wait that long?
We're updating openafs to version 1.4.11 with this kernel change.
We're using RedHat's Fuse with this kernel change
For x86_64 we're using RedHat's XFS with this kernel change
We're replacing madwifi with the proper atheros driver, with this kernel 
change. (maybe)

We're replacing ipw3945 with iwlwifi-3945 with this kernel change. (maybe)

For the maybies (madwifi and ipw3945), I'm not sure the infrastructure 
is in place on the older SL 5 releases.  So we might just keep providing 
those kernel-modules, which will probrubly be the easy way to do things.


I might be able to be persuaded to move the time frame up, but it 
definitely is going into testing today, and will be there at least one 
day, no shorter.


Troy


Thanks,
Stephan

We already have the kernels all built, and are working on the  
dependencies.


Troy

Faye Gibbins wrote:

Hi,
 Any comment from the SL5 distro  maintainers on this exploit  
apparently in recent RHEL releases?

http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
Faye


--
__
Troy Dawson  daw...@fnal.gov  (630)840-6468
Fermilab  ComputingDivision/LSCS/CSI/USS Group
__





--
__
Troy Dawson  daw...@fnal.gov  (630)840-6468
Fermilab  ComputingDivision/LSCS/CSI/USS Group
__