I saw that there is a local root exploit in the wild. blog.kagesenshi.org/2008/02/local-root-exploit-on-wild.html And I see my centos box still has: 2.6.18-53.1.4.el5 yum says there are no updates... am I safe? Valent.
Valent Turkovic wrote:> I saw that there is a local root exploit in the wild. > blog.kagesenshi.org/2008/02/local-root-exploit-on-wild.html > > And I see my centos box still has: 2.6.18-53.1.4.el5 > > yum says there are no updates... am I safe? > > Valent.No you're not... and we are a lot in this very embarrassing situation... You can compile (you need kernel-pae-devel's rpm) and insmod this kernel module while waiting for redhat to push out a new kernel and then that centos reroll it. home.powertech.no/oystein/ptpatch2008 kfx> _______________________________________________ > CentOS mailing list > CentOS at centos.org > lists.centos.org/mailman/listinfo/centos
Valent Turkovic wrote:> I saw that there is a local root exploit in the wild. > blog.kagesenshi.org/2008/02/local-root-exploit-on-wild.html > > And I see my centos box still has: 2.6.18-53.1.4.el5 > > yum says there are no updates... am I safe?No, you are not safe - and you should have rebooted after the last kernel update (2.6.18-53.1.5.el5 is current). But that kernel isn't safe either. See <bugzilla.redhat.com/show_bug.cgi?id=432251> for a temporary workaround. Cheers, Ralph -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <lists.centos.org/pipermail/centos/attachments/20080211/af899c0f/attachment.sig>
Valent Turkovic wrote:> I saw that there is a local root exploit in the wild. > blog.kagesenshi.org/2008/02/local-root-exploit-on-wild.html > > And I see my centos box still has: 2.6.18-53.1.4.el5 > > yum says there are no updates... am I safe? > > Valent.Define safe :) The RHEL-5 (and therefore the centos-5) kernels ARE susceptible to this issue, so no you are NOT safe. Here is the upstream bug: bugzilla.redhat.com/show_bug.cgi?id=432251 However, this issue is actively being worked by the upstream provider and a fix will be released VERY soon. This issue is not remotely exploitable and initially requires local user access to gain root. Here is more info on this issue as well: redhat.com/archives/fedora-list/2008-February/msg01215.html Thanks, Johnny Hughes -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 252 bytes Desc: OpenPGP digital signature URL: <lists.centos.org/pipermail/centos/attachments/20080211/843f3a41/attachment.sig>
Valent Turkovic wrote:> I saw that there is a local root exploit in the wild. > blog.kagesenshi.org/2008/02/local-root-exploit-on-wild.html > > And I see my centos box still has: 2.6.18-53.1.4.el5 > > yum says there are no updates... am I safe? > > Valent. > _______________________________________________ > CentOS mailing list > CentOS at centos.org > lists.centos.org/mailman/listinfo/centosThe current kernel is 53.1.6.el5 If yum isn't seeing it - it probably needs to clean its cached headers. try: yum clean headers yum update kernel However - the 53.1.6.el5 release also is vulnerable, so you may as well wait for the exploit to be fixed before updating. I'm guessing CentOS will do it fairly quickly after rhel does.