Hi Michael,<br>Does the system automatically boot into the new kernel?<br>Or does it need to be select upon reboot?<br>My system is too far away and I want to be sure before I do it.<br><br>Best Regards,<br><br><div class="gmail_quote">
On Sun, Aug 16, 2009 at 12:39 PM, Michael Stauber <span dir="ltr"><<a href="mailto:mstauber@blueonyx.it">mstauber@blueonyx.it</a>></span> wrote:<br><blockquote class="gmail_quote" style="border-left: 1px solid rgb(204, 204, 204); margin: 0pt 0pt 0pt 0.8ex; padding-left: 1ex;">
Hi all,<br>
<br>
A vulnerability (Null pointer dereference) has been found in all Linux 2.4/2.6<br>
kernel versions since May 2001. This vulnerability could allow a local<br>
unprivileged user to gain root access. An exploit for it is already in the<br>
wild and usage of the exploit is fairly simple.<br>
<br>
This vulnerability (of course) also affects the latest CentOS5 kernel on<br>
BlueOnyx.<br>
<br>
More info on the vulnerability:<br>
<br>
<a href="http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html" target="_blank">http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html</a><br>
<a href="http://lists.grok.org.uk/pipermail/full-disclosure/2009-August/070197.html" target="_blank">http://lists.grok.org.uk/pipermail/full-disclosure/2009-August/070197.html</a><br>
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=516949#c10" target="_blank">https://bugzilla.redhat.com/show_bug.cgi?id=516949#c10</a><br>
<br>
Linus Torvalds commented on this last Friday and submitted at patch into the<br>
code repository at <a href="http://kernel.org" target="_blank">kernel.org</a>:<br>
<br>
<a href="http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e694958388c50148389b0e9b9e9e8945cf0f1b98" target="_blank">http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e694958388c50148389b0e9b9e9e8945cf0f1b98</a><br>
<br>
As of right now there is no official patched kernel available from either<br>
RedHat or CentOS. One for Fedora is out though. The one from RedHat will<br>
probably around sometime early next week and the one from CentOS might take a<br>
bit longer - as usual (they just sat on a glibc update for nine days).<br>
<br>
As I rolled up a fixed kernel for Aventurin{e} anyway I went one step further<br>
and build a separate for BlueOnyx, too.<br>
<br>
*PLEASE NOTE:* This updated kernel is not tested that well. It's tested in so<br>
far that it boots on the test machines I have access to. It's also tested that<br>
it closes the vulnerability CVE-2009-2692 mentioned here. It still may not<br>
work for you, although nothing speaks against it.<br>
<br>
For this reason this kernel is in the BlueOnyx-Testing repository, which is<br>
disabled by default.<br>
<br>
So you can either choose if you want to risk it with this custom kernel, or<br>
you can choose if you want to wait for the official CentOS kernel.<br>
<br>
As mentioned above: The exploit requires local access (either through a shell<br>
account, or through a vulnerable (web) application for example.<br>
<br>
<br>
How to enable the testing repository:<br>
--------------------------------------------<br>
<br>
(The testing repository has been cleaned out, so only the custom kernel is in<br>
it and no "other surprises".)<br>
<br>
As "root" edit this file on your server:<br>
<br>
/etc/yum.repos.d/BlueOnyx.repo<br>
<br>
Find the following section at the bottom:<br>
<br>
[BlueOnyx-Testing]<br>
name=BlueOnyx 5106R Testing - $basearch<br>
#baseurl=<a href="http://www.blueonyx.it/pub/BlueOnyx/5106R/CentOS5/blueonyx/testing/%0Amirrorlist=http://www.blueonyx.it/mirror.php?release=$releasever&arch=testing%0Agpgcheck=1%0Aenabled=0%0Agpgkey=http://www.blueonyx.it/pub/BlueOnyx/RPM-GPG-KEY-NUSOL-5106R" target="_blank">http://www.blueonyx.it/pub/BlueOnyx/5106R/CentOS5/blueonyx/testing/<br>
mirrorlist=http://www.blueonyx.it/mirror.php?release=$releasever&arch=testing<br>
gpgcheck=1<br>
enabled=0<br>
gpgkey=http://www.blueonyx.it/pub/BlueOnyx/RPM-GPG-KEY-NUSOL-5106R</a><br>
<br>
In it set the switch "enabled=0" to "enabled=1".<br>
<br>
Then run "yum clean all" and "yum update". That should download the updated<br>
kernel. For easy identification it has the extension "bx02" at the end.<br>
<br>
After the yum update edit the yum repository file again to set the testing<br>
repository back to disabled.<br>
<br>
Then reboot your server. Don't skip this step, as you need to boot into the<br>
new kernel to be protected.<br>
<br>
To confirm that your server has booted the correct kernel, run "uname -r". It<br>
should report something like this:<br>
<br>
2.6.18-128.4.2.el5.bx02<br>
...or...<br>
2.6.18-128.4.2.el5.bx02-PAE<br>
<br>
The important part in the name is "bx02". If it's not showing that, then your<br>
box has booted an unpatched (stock) kernel.<br>
<br>
--<br>
With best regards<br>
<br>
Michael Stauber<br>
<br>
_______________________________________________<br>
Blueonyx mailing list<br>
<a href="mailto:Blueonyx@blueonyx.it">Blueonyx@blueonyx.it</a><br>
<a href="http://www.blueonyx.it/mailman/listinfo/blueonyx" target="_blank">http://www.blueonyx.it/mailman/listinfo/blueonyx</a><br>
</blockquote></div><br>