Re: [CentOS] CVE-2013-2094 and CentOS 6.x

2013-05-17 Thread Johnny Hughes
On 05/16/2013 01:19 PM, Jake Shipton wrote:
> On Wed, 15 May 2013 11:48:14 -0700 (PDT)
> "David C. Miller"  wrote:
>
>> For those who don't know yet here is the redhat bugzilla on this
>> exploit.
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=962792
>>
>> Does anyone know if CentOS 6 have the debug packages available to
>> apply the temp patch for this listed in the bugzilla link?
>>
>> David.
>>
>> ___
>> CentOS mailing list
>> CentOS@centos.org
>> http://lists.centos.org/mailman/listinfo/centos
> Redhat have released a new kernel to fix the bug :-).
>
> https://rhn.redhat.com/errata/RHSA-2013-0830.html

CentOS has also released this:

http://lists.centos.org/pipermail/centos-announce/2013-May/019733.html



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2013-2094 and CentOS 6.x

2013-05-16 Thread Jake Shipton
On Wed, 15 May 2013 11:48:14 -0700 (PDT)
"David C. Miller"  wrote:

> 
> For those who don't know yet here is the redhat bugzilla on this
> exploit.
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=962792
> 
> Does anyone know if CentOS 6 have the debug packages available to
> apply the temp patch for this listed in the bugzilla link?
> 
> David.
> 
> ___
> CentOS mailing list
> CentOS@centos.org
> http://lists.centos.org/mailman/listinfo/centos

Redhat have released a new kernel to fix the bug :-).

https://rhn.redhat.com/errata/RHSA-2013-0830.html

-- 
Jake Shipton (JakeMS)
GPG Key: 0xE3C31D8F
GPG Fingerprint: 7515 CC63 19BD 06F9 400A DE8A 1D0B A5CF E3C3 1D8F


signature.asc
Description: PGP signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2013-2094 and CentOS 6.x

2013-05-16 Thread Peter Kjellström
On Wednesday 15 May 2013 11:48:14 David C. Miller wrote:
> For those who don't know yet here is the redhat bugzilla on this exploit.
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=962792
> 
> Does anyone know if CentOS 6 have the debug packages available to apply the
> temp patch for this listed in the bugzilla link?

An alternative to the somewhat complicated process of getting a full systemtap 
build environment running is to use precompiled modules. I've made mine 
available. Here are pros and cons:

+ only needs the base pkg systemtap-runtime
+ easy to deploy
+ disables perf as long as active (stops the vuln)

- you got to trust me but:
 * I've signed this email with my normal key used previously on the list
 * I included md5sums
- my systemtap fix is more blunt, disables perf_event_open completely
- you need to be running a matching kernel (I built for -358.2.1 and 6.1)
- you can't rename the .ko file

Instructions:
 1) get the .ko file matching your kernel (35821 for -358.2.1, ...)
 2) check the md5sum
 3) insert it with "# staprun -L ./perf_event_blocker_358?1.ko"

 4) (optional) "perf stat true" should now fail with -14
 5) (optionally to disable) "staprun -A" + Ctrl-C

http://www.nsc.liu.se/~cap/perf_event_blocker_35821.ko
http://www.nsc.liu.se/~cap/perf_event_blocker_35861.ko
http://www.nsc.liu.se/~cap/perf_event_blocker.stp

e721fcbdcd1f7616ddd11d41f4909545  perf_event_blocker_35821.ko
a1a9819138bada0a1a7d9c21c6458510  perf_event_blocker_35861.ko
05f0bfd3030db4d4f4deb0fdc71b7fa3  perf_event_blocker.stp

/Peter

-- 
-= Peter Kjellström
-= National Supercomputer Centre

signature.asc
Description: This is a digitally signed message part.
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


Re: [CentOS] CVE-2013-2094 and CentOS 6.x

2013-05-15 Thread Johnny Hughes
On 05/15/2013 01:48 PM, David C. Miller wrote:
> For those who don't know yet here is the redhat bugzilla on this exploit.
>
> https://bugzilla.redhat.com/show_bug.cgi?id=962792
>
> Does anyone know if CentOS 6 have the debug packages available to apply the 
> temp patch for this listed in the bugzilla link?
>

http://lists.centos.org/pipermail/centos-announce/2013-May/019729.html



signature.asc
Description: OpenPGP digital signature
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos


[CentOS] CVE-2013-2094 and CentOS 6.x

2013-05-15 Thread David C. Miller

For those who don't know yet here is the redhat bugzilla on this exploit.

https://bugzilla.redhat.com/show_bug.cgi?id=962792

Does anyone know if CentOS 6 have the debug packages available to apply the 
temp patch for this listed in the bugzilla link?

David.

___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos