--MpKs5nvDfep3D9OD5ja2SG0WqFT5NdFsd
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=mQRq
-----END PGP SIGNATURE-----

--MpKs5nvDfep3D9OD5ja2SG0WqFT5NdFsd--
=========================================================================
Date:         Fri, 21 Oct 2016 18:12:34 +0100
Reply-To:     Alan Bartlett <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Alan Bartlett <[log in to unmask]>
Subject:      Re: Kernel Local Privilege Escalation - CVE-2016-5195
Comments: To: Akemi Yagi <[log in to unmask]>
Comments: cc: "[log in to unmask]"
          <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Message-ID:  <[log in to unmask]>

On 20 October 2016 at 23:32, Akemi Yagi <[log in to unmask]> wrote:
>
> As far as I can see, it is not trivial to apply the patch to the
> current EL kernels. Hopefully Red Hat publishes the patched kernel
> soon.
>
> But if you really need to run a fixed kernel today, I suggest you
> install the latest kernel-ml from ELRepo. It is version 4.8.3 and does
> contain the referenced patch.
>
> http://elrepo.org/tiki/kernel-ml
>
> Akemi

Further to Akemi's note (above), the latest kernel-lt (EL5, EL6 & EL7)
and the latest kernel-ml (EL6 & EL7) package sets, available from the
ELRepo Project, all contain the upstream patch (commit
19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619).

Alan.
=========================================================================
Date:         Sat, 22 Oct 2016 18:02:54 +0200
Reply-To:     Valentin B <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Valentin B <[log in to unmask]>
Subject:      Cowroot vulnerability
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
              protocol="application/pgp-signature";
              boundary="57xw9xUg6hFjqWTbiXviubU0gG4jUDqq9"
Message-ID:  <[log in to unmask]>

--57xw9xUg6hFjqWTbiXviubU0gG4jUDqq9
Content-Type: multipart/mixed; boundary="saKAn91gwrtAIJ2afhAElm7XE2PGnUfUW";
 protected-headers="v1"
From: Valentin B <[log in to unmask]>
To: "[log in to unmask]"
 <[log in to unmask]>
Message-ID: <[log in to unmask]>
Subject: Cowroot vulnerability

--saKAn91gwrtAIJ2afhAElm7XE2PGnUfUW
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi,

Are there patches already available for the following exploits?

https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs


--=20
Valentin Bajrami
Kapteyn Astronomical Institute
University of Groningen
Postbus 800
NL-9700 AV Groningen
The Netherlands
Phone: +31-(0)50-3634068


PGP Fingerprint: 50D7 E233 C2E0 1C81 BB7F F8D8 E51B CF89 A52E 5271


--saKAn91gwrtAIJ2afhAElm7XE2PGnUfUW--

--57xw9xUg6hFjqWTbiXviubU0gG4jUDqq9
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=Nre1
-----END PGP SIGNATURE-----

--57xw9xUg6hFjqWTbiXviubU0gG4jUDqq9--
=========================================================================
Date:         Sat, 22 Oct 2016 12:02:42 -0700
Reply-To:     Akemi Yagi <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Akemi Yagi <[log in to unmask]>
Subject:      Re: Xorg crashes
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Message-ID:  <[log in to unmask]>

On Fri, Oct 21, 2016 at 7:15 AM, Valentin B <[log in to unmask]> wrote:

> Recently I upgraded a machine from 6.8 to 7.2 (Nitrogen). The machine is
> randomly frozen and nothing works afterwards. No ctrl+alt+f2,f3,f4 etc.
> The machine seems to be reponsive since I can ssh to it.

> 01:00.0 VGA compatible controller: NVIDIA Corporation GF116 [GeForce GTX
> 550 Ti] (rev a1)


> I've done some research on the net and saw the following links that
> describe the problem.
>
> https://bugzilla.redhat.com/show_bug.cgi?id=1158879
> https://bugs.freedesktop.org/show_bug.cgi?id=87819
> https://bbs.archlinux.org/viewtopic.php?id=188004

According to comment #23 of the 2nd link above (
https://bugs.freedesktop.org/show_bug.cgi?id=87819#c23 ),

"Module nouveau from linux-3.19.1 seems to fix the bug"

So, it may be worthwhile for you to test-install ELRepo's kernel-ml
which is at version 4.8.4.

However, a better solution could be to use ELRepo's Nvidia driver.
More details can be found at:

http://elrepo.org/tiki/nvidia-detect

Akemi
=========================================================================
Date:         Sun, 23 Oct 2016 01:49:52 +0200
Reply-To:     Valentin B <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Valentin B <[log in to unmask]>
Subject:      Re: Xorg crashes
Comments: To: Akemi Yagi <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
              protocol="application/pgp-signature";
              boundary="t523iJr9dbKetU5d8LWuhDsOkkBso2XbX"
Message-ID:  <[log in to unmask]>

--t523iJr9dbKetU5d8LWuhDsOkkBso2XbX
Content-Type: multipart/mixed; boundary="7WflvWPPKQA6xXX0b5rVvqJJ5tMwdjflm";
 protected-headers="v1"
From: Valentin B <[log in to unmask]>
To: Akemi Yagi <[log in to unmask]>,
 "[log in to unmask]"
 <[log in to unmask]>
Message-ID: <[log in to unmask]>
Subject: Re: Xorg crashes
References: <[log in to unmask]>
 <[log in to unmask]>
In-Reply-To: <[log in to unmask]>

--7WflvWPPKQA6xXX0b5rVvqJJ5tMwdjflm
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Akemi,

Thanks you for the links. I installed nvidia as you suggested. I'll just
have to wait and see if this fixes the problem.

Best,
Valentin

On 10/22/2016 09:02 PM, Akemi Yagi wrote:
> On Fri, Oct 21, 2016 at 7:15 AM, Valentin B <[log in to unmask]> wro=
te:
>=20
>> Recently I upgraded a machine from 6.8 to 7.2 (Nitrogen). The machine =
is
>> randomly frozen and nothing works afterwards. No ctrl+alt+f2,f3,f4 etc=
=2E
>> The machine seems to be reponsive since I can ssh to it.
>=20
>> 01:00.0 VGA compatible controller: NVIDIA Corporation GF116 [GeForce G=
TX
>> 550 Ti] (rev a1)
>=20
>=20
>> I've done some research on the net and saw the following links that
>> describe the problem.
>>
>> https://bugzilla.redhat.com/show_bug.cgi?id=3D1158879
>> https://bugs.freedesktop.org/show_bug.cgi?id=3D87819
>> https://bbs.archlinux.org/viewtopic.php?id=3D188004
>=20
> According to comment #23 of the 2nd link above (
> https://bugs.freedesktop.org/show_bug.cgi?id=3D87819#c23 ),
>=20
> "Module nouveau from linux-3.19.1 seems to fix the bug"
>=20
> So, it may be worthwhile for you to test-install ELRepo's kernel-ml
> which is at version 4.8.4.
>=20
> However, a better solution could be to use ELRepo's Nvidia driver.
> More details can be found at:
>=20
> http://elrepo.org/tiki/nvidia-detect
>=20
> Akemi
>=20

--=20
Valentin Bajrami
Kapteyn Astronomical Institute
University of Groningen
Postbus 800
NL-9700 AV Groningen
The Netherlands
Phone: +31-(0)50-3634068


PGP Fingerprint: 50D7 E233 C2E0 1C81 BB7F F8D8 E51B CF89 A52E 5271


--7WflvWPPKQA6xXX0b5rVvqJJ5tMwdjflm--

--t523iJr9dbKetU5d8LWuhDsOkkBso2XbX
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=isa4
-----END PGP SIGNATURE-----

--t523iJr9dbKetU5d8LWuhDsOkkBso2XbX--
=========================================================================
Date:         Mon, 24 Oct 2016 09:09:01 -0500
Reply-To:     Pat Riehecky <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Pat Riehecky <[log in to unmask]>
Subject:      Re: Cowroot vulnerability
Comments: To: Valentin B <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit
Message-ID:  <[log in to unmask]>

Updated packages for SL7 are currently compiling.

Pat

On 10/22/2016 11:02 AM, Valentin B wrote:
> Hi,
>
> Are there patches already available for the following exploits?
>
> https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
>
>
=========================================================================
Date:         Mon, 24 Oct 2016 11:02:30 -0500
Reply-To:     Pat Riehecky <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Pat Riehecky <[log in to unmask]>
Subject:      Re: Cowroot vulnerability
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit
Message-ID:  <[log in to unmask]>

Published

On 10/24/2016 09:09 AM, Pat Riehecky wrote:
> Updated packages for SL7 are currently compiling.
>
> Pat
>
> On 10/22/2016 11:02 AM, Valentin B wrote:
>> Hi,
>>
>> Are there patches already available for the following exploits?
>>
>> https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
>>
>>
=========================================================================
Date:         Mon, 24 Oct 2016 22:13:02 +0200
Reply-To:     Valentin B <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Valentin B <[log in to unmask]>
Subject:      Re: Cowroot vulnerability
Comments: To: Pat Riehecky <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha256;
              protocol="application/pgp-signature";
              boundary="s7uK1MLfEK5goUXk1Vn7r5SIiFsDJp5s6"
Message-ID:  <[log in to unmask]>

--s7uK1MLfEK5goUXk1Vn7r5SIiFsDJp5s6
Content-Type: multipart/mixed; boundary="QSMRpXqnnWiieXJXKUrS7CPuDbMWhuptC";
 protected-headers="v1"
From: Valentin B <[log in to unmask]>
To: Pat Riehecky <[log in to unmask]>, [log in to unmask]
Message-ID: <[log in to unmask]>
Subject: Re: [SCIENTIFIC-LINUX-DEVEL] Cowroot vulnerability
References: <[log in to unmask]>
 <[log in to unmask]>
 <[log in to unmask]>
In-Reply-To: <[log in to unmask]>

--QSMRpXqnnWiieXJXKUrS7CPuDbMWhuptC
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Pat,

If this patch / fix was applied to kernel 3.10.0-327.36.3.el7.x86_64
then it seems to me more of a mitigation / blocker instead.

The patch applied to 4.7.9-200.fc24.x86_64 on Fedora 24 seems more of a
proper fix.  The cowroot vulnerability doesn't get the chance to be
executed at all.

Best regards,
Valentin

On 10/24/2016 06:02 PM, Pat Riehecky wrote:
> Published
>=20
> On 10/24/2016 09:09 AM, Pat Riehecky wrote:
>> Updated packages for SL7 are currently compiling.
>>
>> Pat
>>
>> On 10/22/2016 11:02 AM, Valentin B wrote:
>>> Hi,
>>>
>>> Are there patches already available for the following exploits?
>>>
>>> https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
>>>
>>>

--=20
Valentin Bajrami
Kapteyn Astronomical Institute
University of Groningen
Postbus 800
NL-9700 AV Groningen
The Netherlands
Phone: +31-(0)50-3634068


PGP Fingerprint: 50D7 E233 C2E0 1C81 BB7F F8D8 E51B CF89 A52E 5271


--QSMRpXqnnWiieXJXKUrS7CPuDbMWhuptC--

--s7uK1MLfEK5goUXk1Vn7r5SIiFsDJp5s6
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCAAGBQJYDmtQAAoJEOUbz4mlLlJx6ikP+QEg7iQa1SsUKIz+CjGU7NgG
5DMB8nue0X9FN5mNo1c00P6o0A5EquAqL1c7Pn6YehbgkRG75gQ5BePbocOcamvi
heTfkZYPpd2o8UnpLAa3dk6HL8T+/v/4Jp3wNNscWIeEBKDwOFjRkV35Zxt2yrJA
zdaTiKzjt3e+dl2of55c5ucwzy75XLkUGf4Ncioxs9Wc6hVhl7UxKpLEnaZQwAEm
SY2p3sJY/0lBnoIyL+tX98It0k9arth95dB0sMKOWi5n+qVtAhqfjGX+7iHRiwvy
eFPIf1Yxzog+m0j8qH3161HuiNDt4joMe47ggMIjIVWN6OO4zY4omVoV1rZTkoDI
9G68e7xGCTTIXTaTUCFL4c3JnGe4lW7KGxWOi/eBx3Uu7xfNbqguS/aaOrQK+B3b
zK5ZiV5gIZuZl+oLI2zyKKWr2s0Old3eKeyZUOz64lJ6m7M3hfFBmRv6MmsYFM7K
P7zmFXi99h6HXB90WTpzWeN4QF/psbmAvgX+ybDhxnGDlaPpBYOCAvfMDwETQU1h
JD6lgcdhW8xso9YewCPCVfldjii2AkZoGDAY8PAGm6ndUtb9filHgJe3ZYlXz92b
+1BKX72BPAFArNODXCivBe3e7wg98JMtX1S/V7xKBTtQBz7pZJZ1Hx6McZNlEO77
u23/RrF/+5lJwaKLhlqH
=Vbxi
-----END PGP SIGNATURE-----

--s7uK1MLfEK5goUXk1Vn7r5SIiFsDJp5s6--
=========================================================================
Date:         Mon, 24 Oct 2016 17:04:45 -0700
Reply-To:     Akemi Yagi <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Akemi Yagi <[log in to unmask]>
Subject:      Re: Cowroot vulnerability
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Message-ID:  <[log in to unmask]>

Hi Valentin,

On Mon, Oct 24, 2016 at 1:13 PM, Valentin B <[log in to unmask]> wrote:
> Hi Pat,
>
> If this patch / fix was applied to kernel 3.10.0-327.36.3.el7.x86_64
> then it seems to me more of a mitigation / blocker instead.

Which "patch / fix" are you referring to? Could you elaborate?

I believe the patch applied to the 7.2 kernel is in principle the same
as what appeared in the upstream kernels at kernel.org. The two
patches are not identical due to rather heavy modifications done to
the RHEL kernel.

> The patch applied to 4.7.9-200.fc24.x86_64 on Fedora 24 seems more of a
> proper fix.  The cowroot vulnerability doesn't get the chance to be
> executed at all.
>
> Best regards,
> Valentin

Akemi
=========================================================================
Date:         Tue, 25 Oct 2016 09:48:43 +0200
Reply-To:     Valentin B <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Valentin B <[log in to unmask]>
Subject:      Re: Cowroot vulnerability
Comments: To: Akemi Yagi <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
              protocol="application/pgp-signature";
              boundary="caOsQBL6huKbQJnXFMbuWHMkoTNEXvcGc"
Message-ID:  <[log in to unmask]>

--caOsQBL6huKbQJnXFMbuWHMkoTNEXvcGc
Content-Type: multipart/mixed; boundary="qDK4j3fGQBNoxmSV0gvGARLfEtEgL2n6n";
 protected-headers="v1"
From: Valentin B <[log in to unmask]>
To: Akemi Yagi <[log in to unmask]>,
 "[log in to unmask]"
 <[log in to unmask]>
Message-ID: <[log in to unmask]>
Subject: Re: [SCIENTIFIC-LINUX-DEVEL] Cowroot vulnerability
References: <[log in to unmask]>
 <[log in to unmask]>
 <[log in to unmask]>
 <[log in to unmask]>
 <[log in to unmask]>
In-Reply-To: <[log in to unmask]>

--qDK4j3fGQBNoxmSV0gvGARLfEtEgL2n6n
Content-Type: multipart/alternative;
 boundary="------------879D21E337084F1FB0855FBC"

This is a multi-part message in MIME format.
--------------879D21E337084F1FB0855FBC
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Akemi,

The fix allows me to run the cow vulnerability but it blocks which is goo=
d.

See the following:

DirtyCow root privilege escalation
Backing up /usr/bin/passwd to /tmp/bak
Size of binary: 27832
Racing, this may take a while..
thread stopped
thread stopped

Based on the following bug report

https://bugzilla.redhat.com/show_bug.cgi?id=3D1384344#c13

, I had compiled a similar module which does the same

1) Download kernel-debuginfo and kernel-debuginfo-common

yum install kernel-debuginfo kernel-debuginfo-common --enablerepo=3D*

2) Create a file mitigation.stp with the following content:


probe kernel.function("mem_write").call ? {
        $count =3D 0
}

probe syscall.ptrace {  // includes compat ptrace as well
        $request =3D 0xfff
}

probe begin {
        printk(0, "CVE-2016-5195 mitigation loaded")
}


probe end {
        printk(0, "CVE-2016-5195 mitigation unloaded")
}


3) Build the module

stap -g -p 4 mitigation.stp

4) module file is placed in the following location=20

/root/.systemtap/cache/f4/stap_f4efcb030069a07d7cacae195d59169a_65631.ko

5)
staprun -L stap_f4efcb030069a07d7cacae195d59169a_65631.ko

6) Deploy and run the module on all affected machines.


So my question is, what has been exactly patched to the recently upstream=
 kernel.

Valentin

On 10/25/2016 02:04 AM, Akemi Yagi wrote:
> Hi Valentin,
>
> On Mon, Oct 24, 2016 at 1:13 PM, Valentin B <[log in to unmask]> wro=
te:
>> Hi Pat,
>>
>> If this patch / fix was applied to kernel 3.10.0-327.36.3.el7.x86_64
>> then it seems to me more of a mitigation / blocker instead.
> Which "patch / fix" are you referring to? Could you elaborate?
>
> I believe the patch applied to the 7.2 kernel is in principle the same
> as what appeared in the upstream kernels at kernel.org. The two
> patches are not identical due to rather heavy modifications done to
> the RHEL kernel.
>
>> The patch applied to 4.7.9-200.fc24.x86_64 on Fedora 24 seems more of =
a
>> proper fix.  The cowroot vulnerability doesn't get the chance to be
>> executed at all.
>>
>> Best regards,
>> Valentin
> Akemi

--=20

Valentin Bajrami
Kapteyn Astronomical Institute
University of Groningen
Postbus 800
NL-9700 AV Groningen
The Netherlands

Phone:    +31-(0)50-3634068

PGP Fingerprint: 50D7 E233 C2E0 1C81 BB7F F8D8 E51B CF89 A52E 5271


--------------879D21E337084F1FB0855FBC
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta content=3D"text/html; charset=3Dutf-8" http-equiv=3D"Content-Ty=
pe">
  </head>
  <body bgcolor=3D"#FFFFFF" text=3D"#000000">
    <p><tt>Hi Akemi,</tt></p>
    <p><tt>The fix allows me to run the cow vulnerability but it blocks
        which is good. <br>
      </tt></p>
    <p><tt>See the following:</tt></p>
    <p><tt>DirtyCow root privilege escalation<br>
        Backing up /usr/bin/passwd to /tmp/bak<br>
        Size of binary: 27832<br>
        Racing, this may take a while..<br>
        thread stopped<br>
        thread stopped<br>
      </tt></p>
    <p><tt>Based on the following bug report </tt></p>
    <pre wrap=3D""><a class=3D"moz-txt-link-freetext" href=3D"https://bug=
zilla.redhat.com/show_bug.cgi?id=3D1384344#c13">https://bugzilla.redhat.c=
om/show_bug.cgi?id=3D1384344#c13</a></pre>
    <p><tt>, I had compiled a similar module which does the same</tt><br>=

      <tt></tt></p>
    <pre wrap=3D"">
1) Download kernel-debuginfo and kernel-debuginfo-common

yum install kernel-debuginfo kernel-debuginfo-common --enablerepo=3D*

2) Create a file mitigation.stp with the following content:


probe kernel.function("mem_write").call ? {
        $count =3D 0
}

probe syscall.ptrace {  // includes compat ptrace as well
        $request =3D 0xfff
}

probe begin {
        printk(0, "CVE-2016-5195 mitigation loaded")
}


probe end {
        printk(0, "CVE-2016-5195 mitigation unloaded")
}


3) Build the module

stap -g -p 4 mitigation.stp

4) module file is placed in the following location=20

<i class=3D"moz-txt-slash"><span class=3D"moz-txt-tag">/</span>root<span =
class=3D"moz-txt-tag">/</span></i>.systemtap/cache/f4/stap_f4efcb030069a0=
7d7cacae195d59169a_65631.ko

5)
staprun -L stap_f4efcb030069a07d7cacae195d59169a_65631.ko

6) Deploy and run the module on all affected machines.


So my question is, what has been exactly patched to the recently upstream=
 kernel.

Valentin
</pre>
    <div class=3D"moz-cite-prefix">On 10/25/2016 02:04 AM, Akemi Yagi
      wrote:<br>
    </div>
    <blockquote
cite=3D"mid:[log in to unmask]
ail.com"
      type=3D"cite">
      <pre wrap=3D"">Hi Valentin,

On Mon, Oct 24, 2016 at 1:13 PM, Valentin B <a class=3D"moz-txt-link-rfc2=
396E" href=3D"mailto:[log in to unmask]">&lt;[log in to unmask]&gt;=
</a> wrote:
</pre>
      <blockquote type=3D"cite">
        <pre wrap=3D"">Hi Pat,

If this patch / fix was applied to kernel 3.10.0-327.36.3.el7.x86_64
then it seems to me more of a mitigation / blocker instead.
</pre>
      </blockquote>
      <pre wrap=3D"">
Which "patch / fix" are you referring to? Could you elaborate?

I believe the patch applied to the 7.2 kernel is in principle the same
as what appeared in the upstream kernels at kernel.org. The two
patches are not identical due to rather heavy modifications done to
the RHEL kernel.

</pre>
      <blockquote type=3D"cite">
        <pre wrap=3D"">The patch applied to 4.7.9-200.fc24.x86_64 on Fedo=
ra 24 seems more of a
proper fix.  The cowroot vulnerability doesn't get the chance to be
executed at all.

Best regards,
Valentin
</pre>
      </blockquote>
      <pre wrap=3D"">
Akemi
</pre>
    </blockquote>
    <br>
    <pre class=3D"moz-signature" cols=3D"72">--=20

Valentin Bajrami
Kapteyn Astronomical Institute
University of Groningen
Postbus 800
NL-9700 AV Groningen
The Netherlands

Phone:    +31-(0)50-3634068

PGP Fingerprint: 50D7 E233 C2E0 1C81 BB7F F8D8 E51B CF89 A52E 5271</pre>
  </body>
</html>

--------------879D21E337084F1FB0855FBC--

--qDK4j3fGQBNoxmSV0gvGARLfEtEgL2n6n--

--caOsQBL6huKbQJnXFMbuWHMkoTNEXvcGc
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=g2JX
-----END PGP SIGNATURE-----

--caOsQBL6huKbQJnXFMbuWHMkoTNEXvcGc--
=========================================================================
Date:         Tue, 25 Oct 2016 05:40:15 -0700
Reply-To:     Akemi Yagi <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Akemi Yagi <[log in to unmask]>
Subject:      Re: Cowroot vulnerability
Comments: To: Valentin B <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: multipart/mixed; boundary="001a11c16282aaefb3053fafd09c"
Message-ID:  <[log in to unmask]>

--001a11c16282aaefb3053fafd09c
Content-Type: text/plain; charset="UTF-8"

On Tue, Oct 25, 2016 at 12:48 AM, Valentin B <[log in to unmask]> wrote:
> Hi Akemi,
>
> The fix allows me to run the cow vulnerability but it blocks which is good.
>
> See the following:
>
> DirtyCow root privilege escalation
> Backing up /usr/bin/passwd to /tmp/bak
> Size of binary: 27832
> Racing, this may take a while..
> thread stopped
> thread stopped
(snip)
> So my question is, what has been exactly patched to the recently upstream
> kernel.

Thanks for the detailed note.

Because the source code is available, I did a diff between kernels
3.10.0-327.36.2.el7 and 3.10.0-327.36.3.el7 and am attaching it for
anyone to see.

Akemi

--001a11c16282aaefb3053fafd09c
Content-Type: text/plain; charset="US-ASCII"; name="362to363.diff"
Content-Disposition: attachment; filename="362to363.diff"
Content-Transfer-Encoding: base64
X-Attachment-Id: f_iuphb4qo1
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--001a11c16282aaefb3053fafd09c--
=========================================================================
Date:         Thu, 27 Oct 2016 15:51:11 +0200
Reply-To:     Valentin B <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Valentin B <[log in to unmask]>
Subject:      intel i915 driver problems
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
              protocol="application/pgp-signature";
              boundary="NbU0i7soI7Fc2po0hmu2ej6190WuDOdHB"
Message-ID:  <[log in to unmask]>

--NbU0i7soI7Fc2po0hmu2ej6190WuDOdHB
Content-Type: multipart/mixed; boundary="HVhpNLrdJa9HRK4cEa84Q1Vmetd6E8tj5";
 protected-headers="v1"
From: Valentin B <[log in to unmask]>
To: "[log in to unmask]"
 <[log in to unmask]>
Message-ID: <[log in to unmask]>
Subject: intel i915 driver problems

--HVhpNLrdJa9HRK4cEa84Q1Vmetd6E8tj5
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi,

On a machine with the intel integrated card, more specifically

00:02.0 VGA compatible controller: Intel Corporation Sky Lake Integrated
Graphics (rev 06)

seem to be some issues with recognizing the monitor properties.

Running `xrandr`  the following output is displayed:

xrandr: Failed to get size of gamma for output default
Screen 0: minimum 1024 x 768, current 1024 x 768, maximum 1024 x 768
default connected primary 1024x768+0+0 0mm x 0mm
   1024x768      76.00*


I've managed to solve the problem using the following steps  as also
explained here:
http://www.linuxquestions.org/questions/centos-111/cannot-change-screen-r=
esolution-on-unknown-display-in-centos7-4175583712/


rpm --import https://www.elrepo.org/RPM-GPG-KEY-elrepo.org
rpm -Uvh http://www.elrepo.org/elrepo-release-7.0-2.el7.elrepo.noarch.rpm=

yum install yum-plugin-fastestmirror
yum --enablerepo=3Delrepo-kernel install kernel-ml


I actually would like to avoid using kernel-ml  since this doesn't
provide any warranty concerning security and system stability in
general.  Has anyone been able to solve the problem differently?

Thanks!
--=20

Valentin Bajrami
Kapteyn Astronomical Institute
University of Groningen
Postbus 800
NL-9700 AV Groningen
The Netherlands

Phone:    +31-(0)50-3634068

PGP Fingerprint: 50D7 E233 C2E0 1C81 BB7F F8D8 E51B CF89 A52E 5271


--HVhpNLrdJa9HRK4cEa84Q1Vmetd6E8tj5--

--NbU0i7soI7Fc2po0hmu2ej6190WuDOdHB
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)
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=L3c/
-----END PGP SIGNATURE-----

--NbU0i7soI7Fc2po0hmu2ej6190WuDOdHB--
=========================================================================
Date:         Thu, 27 Oct 2016 08:54:23 -0500
Reply-To:     Pat Riehecky <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Pat Riehecky <[log in to unmask]>
Subject:      Re: intel i915 driver problems
Comments: To: Valentin B <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Transfer-Encoding: 7bit
Message-ID:  <[log in to unmask]>

Might this be related? https://bugzilla.redhat.com/show_bug.cgi?id=1306841

On 10/27/2016 08:51 AM, Valentin B wrote:
> Hi,
>
> On a machine with the intel integrated card, more specifically
>
> 00:02.0 VGA compatible controller: Intel Corporation Sky Lake Integrated
> Graphics (rev 06)
>
> seem to be some issues with recognizing the monitor properties.
>
> Running `xrandr`  the following output is displayed:
>
> xrandr: Failed to get size of gamma for output default
> Screen 0: minimum 1024 x 768, current 1024 x 768, maximum 1024 x 768
> default connected primary 1024x768+0+0 0mm x 0mm
>     1024x768      76.00*
>
>
> I've managed to solve the problem using the following steps  as also
> explained here:
> http://www.linuxquestions.org/questions/centos-111/cannot-change-screen-resolution-on-unknown-display-in-centos7-4175583712/
>
>
> rpm --import https://www.elrepo.org/RPM-GPG-KEY-elrepo.org
> rpm -Uvh http://www.elrepo.org/elrepo-release-7.0-2.el7.elrepo.noarch.rpm
> yum install yum-plugin-fastestmirror
> yum --enablerepo=elrepo-kernel install kernel-ml
>
>
> I actually would like to avoid using kernel-ml  since this doesn't
> provide any warranty concerning security and system stability in
> general.  Has anyone been able to solve the problem differently?
>
> Thanks!
=========================================================================
Date:         Thu, 27 Oct 2016 15:56:22 +0200
Reply-To:     Valentin B <[log in to unmask]>
Sender:       Mailing list for Scientific Linux developers worldwide
              <[log in to unmask]>
From:         Valentin B <[log in to unmask]>
Subject:      Re: intel i915 driver problems
Comments: To: Pat Riehecky <[log in to unmask]>
In-Reply-To:  <[log in to unmask]>
MIME-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
              protocol="application/pgp-signature";
              boundary="axUUDNW1S7Rr7mKInPw15mnp8OwLi7Q9A"
Message-ID:  <[log in to unmask]>

--axUUDNW1S7Rr7mKInPw15mnp8OwLi7Q9A
Content-Type: multipart/mixed; boundary="O5JOGq0kEWwJ0p5ejqw59P2GTe0SUhImp";
 protected-headers="v1"
From: Valentin B <[log in to unmask]>
To: Pat Riehecky <[log in to unmask]>, [log in to unmask]
Message-ID: <[log in to unmask]>
Subject: Re: [SCIENTIFIC-LINUX-DEVEL] intel i915 driver problems
References: <[log in to unmask]>
 <[log in to unmask]>
In-Reply-To: <[log in to unmask]>

--O5JOGq0kEWwJ0p5ejqw59P2GTe0SUhImp
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Pat,

This is exactly the same problem I'm experiencing. I'll have to wait
till 7.3 is pushed out then.  Thanks for your quick response.

Valentin

On 10/27/2016 03:54 PM, Pat Riehecky wrote:
> Might this be related? https://bugzilla.redhat.com/show_bug.cgi?id=3D13=
06841
>=20
> On 10/27/2016 08:51 AM, Valentin B wrote:
>> Hi,
>>
>> On a machine with the intel integrated card, more specifically
>>
>> 00:02.0 VGA compatible controller: Intel Corporation Sky Lake Integrat=
ed
>> Graphics (rev 06)
>>
>> seem to be some issues with recognizing the monitor properties.
>>
>> Running `xrandr`  the following output is displayed:
>>
>> xrandr: Failed to get size of gamma for output default
>> Screen 0: minimum 1024 x 768, current 1024 x 768, maximum 1024 x 768
>> default connected primary 1024x768+0+0 0mm x 0mm
>>     1024x768      76.00*
>>
>>
>> I've managed to solve the problem using the following steps  as also
>> explained here:
>> http://www.linuxquestions.org/questions/centos-111/cannot-change-scree=
n-resolution-on-unknown-display-in-centos7-4175583712/
>>
>>
>>
>> rpm --import https://www.elrepo.org/RPM-GPG-KEY-elrepo.org
>> rpm -Uvh http://www.elrepo.org/elrepo-release-7.0-2.el7.elrepo.noarch.=
rpm
>> yum install yum-plugin-fastestmirror
>> yum --enablerepo=3Delrepo-kernel install kernel-ml
>>
>>
>> I actually would like to avoid using kernel-ml  since this doesn't
>> provide any warranty concerning security and system stability in
>> general.  Has anyone been able to solve the problem differently?
>>
>> Thanks!

--=20

Valentin Bajrami
Kapteyn Astronomical Institute
University of Groningen
Postbus 800
NL-9700 AV Groningen
The Netherlands

Phone:    +31-(0)50-3634068

PGP Fingerprint: 50D7 E233 C2E0 1C81 BB7F F8D8 E51B CF89 A52E 5271


--O5JOGq0kEWwJ0p5ejqw59P2GTe0SUhImp--

--axUUDNW1S7Rr7mKInPw15mnp8OwLi7Q9A
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.22 (GNU/Linux)

iQIcBAEBAgAGBQJYEgeGAAoJEOUbz4mlLlJx9qQQAKKtFrQPHLMK9fzCTWKkKyYC
84vZPqaSBFf6wEPrxQaqRa+4BE8aShMjGyeWzcNhb/k6TsIOqvgMCQpkRntJjcFg
DVravVw5GhXCpeJGnxjwVjv/ARBl0m+qq62lX5ljmm4K54CX7M3oYCeVUhpaCEQf
fZM0QmKyJkd0PNl1nCKwYOjaUf2GShne+W5ogF1aMnGw2ygpS+g1d/cLzNoZTyTO
g2gc7IaqTnq1tZsYgvQfDq9Dmgh6oQXIp+rizGRFrZakmm6w62J7Q9kxDjnojfvM
NDdr8XiL3i6UtTEgvGtuWfwTABWmp7s7OVQLRJdQUffNRg29IuhHdbVWfnMkYTPK
iaUbF4PjFiBCTeToB3rrKmEcI2FI+30RBT0SV1hG3KUXgpCnTn/qDp8fUtF/K/mn
n1+YTkBRXMmDz22i94i2pBA498Y3Ots1BYl2vQ+hc9pBCnVVwvyTCnekGbMqdF9o
kjsy2OzUnM1VdJEmH15YeI/SmZCAn19H791PJ0DojShnFujIe/JHo2RzoTUCLs62
1BZw5T8UH/Q2xZx2fODhCzgd4OBqUu6bOEqQh70Vv8YyF4PLPVl1Wb8FMlDgXaLd
qqlFkmUxYtc+JE/MltIUUe/uwLHlFtZ+LdbLGjoZA/h0AajE77weygbunSfYo0ND
5+bXQjLVuKUDWDvimAVc
=KN08
-----END PGP SIGNATURE-----

--axUUDNW1S7Rr7mKInPw15mnp8OwLi7Q9A--