On Mon, 2008-02-11 at 10:45 -0800, Akemi Yagi wrote:
> On Feb 11, 2008 8:19 AM, Scott McClanahan <[EMAIL PROTECTED]> wrote:
> >
> > On Mon, 2008-02-11 at 04:52 -0800, Michael A. Peters wrote:
> > > Valent Turkovic wrote:
> > > > I saw that there is a local root exploit in the wild.
> > > > http://blog.kagesenshi.org/2008/02/local-root-exploit-on-wild.html
> > > >
> > > > And I see my centos box still has:  2.6.18-53.1.4.el5
> > > >
> > > > yum says there are no updates... am I safe?
> > > >
> > > > Valent.
> 
> > > The current kernel is 53.1.6.el5
> > >
> > > If yum isn't seeing it - it probably needs to clean its cached headers.
> > >
> > > try:
> > >
> > > yum clean headers
> > > yum update kernel
> > >
> > > However - the 53.1.6.el5 release also is vulnerable, so you may as well
> > > wait for the exploit to be fixed before updating. I'm guessing CentOS
> > > will do it fairly quickly after rhel does.
> > >
> >
> > I understand that a known root exploit must be patched but I'm curious
> > to know if we upgrade to the fixed kernel once released will it also
> > include the degraded nfs performance discussed here:
> >
> > https://bugzilla.redhat.com/show_bug.cgi?id=431092
> 
> We have to wait and see, but my impression is that the nfs fix would
> not be in the updated kernel (I hope I am wrong).  They are talking
> about getting it into 5.2 (even possibly into 5.3).  I can see that
> this is a problem.  Now, we can not "stay with 53.1.4"  on the systems
> where the local root exploit is a serious problem.
> 
> Akemi
> 
> Akemi

Yes, until now we had no problem stalling on 53.1.4.  I guess we'll have
to test how badly the nfs performance degradation actually is under a
heavy load in our environment.

_______________________________________________
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos

Reply via email to