Re: How to Install Wireless Adapter on Toshiba Laptop

2009-08-14 Thread Alan Bartlett
On 14/08/2009, Eugene Shin interglob...@gmail.com wrote:

 After thoughts, I decided to manually download and install kmod-ath5k*rpm
 and kmod-mac80211*rpm. It seems that I made some progress in setting up
 network service in the end; the network adapter recognized the ath5k and
 wlan0 as a hardware and wireless adater respectively. But still I cannot
 activate the wireless adapter. Whenever I attempt to activate it, it says
 ath5k device wlan0 does not seem to be present, delaying initialization.
 Is this just a technical problem that I would be able to resolve soon, or
 did I make a fundamental mistake when I installed them?

Eugene,

As I do not use the package (I do not use any wireless connection), it
is rather difficult for me to comment. However, from what you have
written, it seems that you have correctly installed both packages
(kmod-ath5k  kmod-mac80211). I assume you appreciate that the correct
kmod, matching both your architecture (32-bit or 64-bit) and your
kernel type must be installed?

There is one thing that would be nice to know -- the Vendor:Device ID
paring for your wireless card. (FAQ #4 at http://elrepo.org/tiki/FAQ
is appropriate.)

If ath5k is the appropriate driver for the card, then I feel that your
inability to connect is probably nothing more than a configuration
issue. And that is something with which I will not be able to advise
you . . .  Hopefully somebody else will be able to assist.

Alan.


kernel security

2009-08-14 Thread Gasser Marc

Hello SL Users,

Is this an issue in SL, too?
If yes, when will there be a new kernel?

http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0174.html


Regards
Marc


Re: kernel security

2009-08-14 Thread Urs Beyerle
Hi,

I guess SL is affected like most other Linux distributions.

I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
should prevent an exploit.

# sysctl vm.mmap_min_addr=4096

Any other suggestions?

Cheers,

Urs



Gasser Marc wrote:
 Hello SL Users,

 Is this an issue in SL, too?
 If yes, when will there be a new kernel?

 http://archives.neohapsis.com/archives/fulldisclosure/2009-08/0174.html


 Regards
 Marc


Re: kernel security

2009-08-14 Thread Urs Beyerle
Urs Beyerle wrote:
 Hi,

 I guess SL is affected like most other Linux distributions.

 I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
 should prevent an exploit.

 # sysctl vm.mmap_min_addr=4096
   

at least on a SL5 system with mmap_min_addr support.

Urs


Re: kernel security

2009-08-14 Thread Stephan Wiesand
On Fri, 2009-08-14 at 12:46 +0200, Urs Beyerle wrote:
 Urs Beyerle wrote:
  Hi,
 
  I guess SL is affected like most other Linux distributions.
 
  I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
  should prevent an exploit.
 
  # sysctl vm.mmap_min_addr=4096

 
 at least on a SL5 system with mmap_min_addr support.

I successfully rooted a 32bit SL5 system with SELinux enabled and
vm.mmap_min_addr=64k with the public exploit :-(

Working on a patched SL5 kernel.

The fix from git is not applicable to the SL4 kernel (which is
vulnerable as well).

Any ides for a workaround?

 Urs
-- 
Stephan Wiesand
  DESY - DV -
  Platanenallee 6
  15738 Zeuthen, Germany


Re: kernel security

2009-08-14 Thread Dr Andrew C Aitchison

On Fri, 14 Aug 2009, Urs Beyerle wrote:

I guess SL is affected like most other Linux distributions.

I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
should prevent an exploit.

# sysctl vm.mmap_min_addr=4096


The default on my SL53 machines appears to be 65536
so there may be no need to do this.

And Stephan Wiesand stephan.wies...@desy.de replied:

I successfully rooted a 32bit SL5 system with SELinux enabled
and vm.mmap_min_addr=64k with the public exploit :-(


Did this machine have kernel-2.6.18-128.4.1.el5 and hence the 
fix for CVE-2009-1895 which allows a user to bypass mmap_min_addr - see
https://rhn.redhat.com/errata/RHSA-2009-1193.html  ? 
Though I did see that there are other ways of bypassing

vm.mmap_min_addr :-(

--
Dr. Andrew C. Aitchison Computer Officer, DPMMS, Cambridge
a.c.aitchi...@dpmms.cam.ac.uk   http://www.dpmms.cam.ac.uk/~werdna


Re: kernel security

2009-08-14 Thread Stephan Wiesand
On Fri, 2009-08-14 at 11:59 +0100, Dr Andrew C Aitchison wrote:
 On Fri, 14 Aug 2009, Urs Beyerle wrote:
  I guess SL is affected like most other Linux distributions.
 
  I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
  should prevent an exploit.
 
  # sysctl vm.mmap_min_addr=4096
 
 The default on my SL53 machines appears to be 65536
 so there may be no need to do this.
 
 And Stephan Wiesand stephan.wies...@desy.de replied:
  I successfully rooted a 32bit SL5 system with SELinux enabled
  and vm.mmap_min_addr=64k with the public exploit :-(
 
 Did this machine have kernel-2.6.18-128.4.1.el5 and hence the 
 fix for CVE-2009-1895 which allows a user to bypass mmap_min_addr - see

Yes.

 https://rhn.redhat.com/errata/RHSA-2009-1193.html  ? 
 Though I did see that there are other ways of bypassing
 vm.mmap_min_addr :-(

Yes, and they work fine :-/

-- 
Stephan Wiesand
  DESY - DV -
  Platanenallee 6
  15738 Zeuthen, Germany


Re: kernel security

2009-08-14 Thread Stephan Wiesand
On Fri, 2009-08-14 at 13:28 +0200, Urs Beyerle wrote:
 Try unload and remove the following kernel modules:
 
 ipx.ko
 irda.ko
 x25.ko
 ax25.ko
 bluetooth.ko
 sctp.ko
 pppoe.ko
 pppox.ko
 
 Does this help?

Yes it helps.

It also helps (on SL5) to disable SELinux and reboot...

Cheers,
Stephan

 Urs
 
 Stephan Wiesand wrote:
  On Fri, 2009-08-14 at 11:59 +0100, Dr Andrew C Aitchison wrote:

  On Fri, 14 Aug 2009, Urs Beyerle wrote:
  
  I guess SL is affected like most other Linux distributions.
 
  I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
  should prevent an exploit.
 
  # sysctl vm.mmap_min_addr=4096

  The default on my SL53 machines appears to be 65536
  so there may be no need to do this.
 
  And Stephan Wiesand stephan.wies...@desy.de replied:
  
  I successfully rooted a 32bit SL5 system with SELinux enabled
  and vm.mmap_min_addr=64k with the public exploit :-(

  Did this machine have kernel-2.6.18-128.4.1.el5 and hence the 
  fix for CVE-2009-1895 which allows a user to bypass mmap_min_addr - see
  
 
  Yes.
 

  https://rhn.redhat.com/errata/RHSA-2009-1193.html  ? 
  Though I did see that there are other ways of bypassing
  vm.mmap_min_addr :-(
  
 
  Yes, and they work fine :-/
 

-- 
Stephan Wiesand
  DESY - DV -
  Platanenallee 6
  15738 Zeuthen, Germany


kernel panic

2009-08-14 Thread Alex Kruchkoff
I'd like to report a problem with 2.6.18-128.4.1.el5 x86_64 kernel running on 
SL 5.0 on laptop ASUS A6000KT: if I turn the power off -- it will trigger the 
kernel panic.

Cheers
Alex


Re: kernel security

2009-08-14 Thread Urs Beyerle
Urs Beyerle wrote:
 Try to unload and remove the following kernel modules:

 ipx.ko
 irda.ko
 x25.ko
 ax25.ko
 bluetooth.ko
 sctp.ko
 pppoe.ko
 pppox.ko

and

appletalk.ko

if you have it.


Urs


Re: kernel security

2009-08-14 Thread Ian Murray
Is this issue only exploitable locally, or can it be done remotely?

Thanks



- Original Message 
 From: Urs Beyerle urs.beye...@env.ethz.ch
 To: Stephan Wiesand stephan.wies...@desy.de
 Cc: Dr Andrew C Aitchison a.c.aitchi...@dpmms.cam.ac.uk; 
 scientific-linux-us...@fnal.gov scientific-linux-us...@fnal.gov; Gasser 
 Marc marc.gas...@psi.ch
 Sent: Friday, 14 August, 2009 14:00:13
 Subject: Re: kernel security
 
 Urs Beyerle wrote:
  Try to unload and remove the following kernel modules:
 
  ipx.ko
  irda.ko
  x25.ko
  ax25.ko
  bluetooth.ko
  sctp.ko
  pppoe.ko
  pppox.ko
 
 and
 
 appletalk.ko
 
 if you have it.
 
 
 Urs


Re: kernel panic

2009-08-14 Thread Troy Dawson

Alex Kruchkoff wrote:

I'd like to report a problem with 2.6.18-128.4.1.el5 x86_64 kernel running on 
SL 5.0 on laptop ASUS A6000KT: if I turn the power off -- it will trigger the 
kernel panic.

Cheers
Alex


What wireless driver does that laptop have?
We've had problems with the altheros chipset, although in the past they 
just hung, and didn't panic, but I haven't tested them on the new kernel.

Troy
--
__
Troy Dawson  daw...@fnal.gov  (630)840-6468
Fermilab  ComputingDivision/LCSI/CSI LMSS Group
__


Re: kernel security

2009-08-14 Thread Matthias Schroeder

Troy Dawson wrote:

Stephan Wiesand wrote:

On Fri, 2009-08-14 at 11:59 +0100, Dr Andrew C Aitchison wrote:

On Fri, 14 Aug 2009, Urs Beyerle wrote:

I guess SL is affected like most other Linux distributions.

I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
should prevent an exploit.

# sysctl vm.mmap_min_addr=4096

The default on my SL53 machines appears to be 65536
so there may be no need to do this.

And Stephan Wiesand stephan.wies...@desy.de replied:

I successfully rooted a 32bit SL5 system with SELinux enabled
and vm.mmap_min_addr=64k with the public exploit :-(
Did this machine have kernel-2.6.18-128.4.1.el5 and hence the 
fix for CVE-2009-1895 which allows a user to bypass mmap_min_addr - see

Yes.

https://rhn.redhat.com/errata/RHSA-2009-1193.html  ? 
Though I did see that there are other ways of bypassing

vm.mmap_min_addr :-(

Yes, and they work fine :-/



Has anyone with a TAM with RedHat reported this to them yet?


You mean
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2692, right?


I'm pretty sure someone has, I just want to verify and get a bug 
tracking number.


There is also an IT, you should be able to see it.

Matthias



Troy


RE: kernel panic

2009-08-14 Thread Alex Kruchkoff
Troy,

It's kernel-module-ndiswrapper-2.6.18-128.4.1.el5-1.53-1.SL.x86_64, but I do 
not use wireless since SL4.

Cheers
Alex


From: owner-scientific-linux-us...@listserv.fnal.gov 
[owner-scientific-linux-us...@listserv.fnal.gov] On Behalf Of Troy Dawson 
[daw...@fnal.gov]
Sent: Friday, 14 August 2009 23:32
To: Alex Kruchkoff
Cc: scientific-linux-us...@fnal.gov
Subject: Re: kernel panic

Alex Kruchkoff wrote:
 I'd like to report a problem with 2.6.18-128.4.1.el5 x86_64 kernel running on 
 SL 5.0 on laptop ASUS A6000KT: if I turn the power off -- it will trigger the 
 kernel panic.

 Cheers
 Alex

What wireless driver does that laptop have?
We've had problems with the altheros chipset, although in the past they
just hung, and didn't panic, but I haven't tested them on the new kernel.
Troy
--
__
Troy Dawson  daw...@fnal.gov  (630)840-6468
Fermilab  ComputingDivision/LCSI/CSI LMSS Group
__


Re: kernel security

2009-08-14 Thread Troy Dawson

Hi Stephan,
I took yours and changed a few times and made my own.  I haven't put it 
into testing yet, but here is what I have.


http://home.fnal.gov/~dawson/test/SL_fix_bad_km.sh
http://home.fnal.gov/~dawson/test/SL_fix_bad_km-1.0-1.noarch.rpm
http://home.fnal.gov/~dawson/test/SL_fix_bad_km-1.0-1.src.rpm

Basically it goes through a list of modules.
If the module is already loaded,
  it first tries to stop the service if it knows how (such as bluetooth 
and irda)

  If the modules is still loaded, it tries modprobe -r
  If the module is still loaded it tried rmmod

It then uses your find script, finds all the offending kernel modules, 
and moves them to a safe directory.  We do this instead of just removing 
them.


We have all the output going to an log file, and send a nice email, 
saying what we did, to root.


I'm sorry it's taken me so long to get this out, but there was various 
testing and talking along the way.

Troy

Stephan Wiesand wrote:

Here's a stab at an SL_rpm to help mitigate the issue for the time
being:

http://www-zeuthen.desy.de/~wiesand/ww/

It will remove(!) the suspicious modules for all kernels on the system,
even those installed later on. It then checks whether one of them is
loaded, and sends mail to root if it is.

Use at your own risk! Any bugs in the script, and this could irreparably
damage your OS installation. Comments very welcome.

- Stephan


On Fri, 2009-08-14 at 15:40 +0200, Matthias Schroeder wrote:

Troy Dawson wrote:

Stephan Wiesand wrote:

On Fri, 2009-08-14 at 11:59 +0100, Dr Andrew C Aitchison wrote:

On Fri, 14 Aug 2009, Urs Beyerle wrote:

I guess SL is affected like most other Linux distributions.

I'm not 100% sure, but setting vm.mmap_min_addr to a value above 0
should prevent an exploit.

# sysctl vm.mmap_min_addr=4096

The default on my SL53 machines appears to be 65536
so there may be no need to do this.

And Stephan Wiesand stephan.wies...@desy.de replied:

I successfully rooted a 32bit SL5 system with SELinux enabled
and vm.mmap_min_addr=64k with the public exploit :-(
Did this machine have kernel-2.6.18-128.4.1.el5 and hence the 
fix for CVE-2009-1895 which allows a user to bypass mmap_min_addr - see

Yes.

https://rhn.redhat.com/errata/RHSA-2009-1193.html  ? 
Though I did see that there are other ways of bypassing

vm.mmap_min_addr :-(

Yes, and they work fine :-/


Has anyone with a TAM with RedHat reported this to them yet?

You mean
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2009-2692, right?


I'm pretty sure someone has, I just want to verify and get a bug 
tracking number.

There is also an IT, you should be able to see it.

Matthias


Troy



--
__
Troy Dawson  daw...@fnal.gov  (630)840-6468
Fermilab  ComputingDivision/LCSI/CSI LMSS Group
__