Richard G
Verified User
I don't know if you guys read it or not, but since there are several people which do not update there kernels on a regular base, please read this:
Read more:
http://arstechnica.com/security/201...ability-imperils-users-even-after-silent-fix/
The flaw affects versions of the Linux kernel from 2.6.37 to 3.8.8 that have been compiled with the CONFIG_PERF_EVENTS kernel configuration option.
There is already an update present via yum if everything is correct.
At least for Centos 6.
For more than two years, the Linux operating system has contained a high-severity vulnerability that gives untrusted users with restricted accounts nearly unfettered "root" access over machines, including servers running in shared Web hosting facilities and other sensitive environments. Surprisingly, most users remain wide open even now, more than a month after maintainers of the open-source OS quietly released an update that patched the gaping hole.
Read more:
http://arstechnica.com/security/201...ability-imperils-users-even-after-silent-fix/
The flaw affects versions of the Linux kernel from 2.6.37 to 3.8.8 that have been compiled with the CONFIG_PERF_EVENTS kernel configuration option.
There is already an update present via yum if everything is correct.
At least for Centos 6.