[CentOS] local root exploit

Scott McClanahan scott.mcclanahan at trnswrks.com
Mon Feb 11 16:19:58 UTC 2008


On Mon, 2008-02-11 at 04:52 -0800, Michael A. Peters wrote:
> Valent Turkovic wrote:
> > I saw that there is a local root exploit in the wild.
> > http://blog.kagesenshi.org/2008/02/local-root-exploit-on-wild.html
> > 
> > And I see my centos box still has:  2.6.18-53.1.4.el5
> > 
> > yum says there are no updates... am I safe?
> > 
> > Valent.
> > _______________________________________________
> > CentOS mailing list
> > CentOS at centos.org
> > http://lists.centos.org/mailman/listinfo/centos
> 
> The current kernel is 53.1.6.el5
> 
> If yum isn't seeing it - it probably needs to clean its cached headers.
> 
> try:
> 
> yum clean headers
> yum update kernel
> 
> However - the 53.1.6.el5 release also is vulnerable, so you may as well 
> wait for the exploit to be fixed before updating. I'm guessing CentOS 
> will do it fairly quickly after rhel does.
> 

I understand that a known root exploit must be patched but I'm curious
to know if we upgrade to the fixed kernel once released will it also
include the degraded nfs performance discussed here:

https://bugzilla.redhat.com/show_bug.cgi?id=431092





More information about the CentOS mailing list