CentOS kernel security exploit | RHEL 2.6.32.X | 15 May 2013
سلام
شرکت BetterLinuxTM امروز برای من ایمیلی رو با عنوان CentOS kernel security exploit ارسال کرده که بنده عین ایمیل رو براتون نقل قول میکنم .
نقل قول:
Dear BetterLinux Beta Customer,
A vulnerability has been discovered in stock CentOS and RHEL 2.6.32.X kernels (and consequently in the BetterLinux kernel) that requires an immediate security response. While we wait for upstream vendors to address the issue, please use this temporary work-around to secure your systems:
Using theutility, alter the thevariable. In part, this variable determines whether you:
- Disallow cpu events for unprivileged users
- Disallow kernel profiling for unprivileged users
Choose option 2, which essentially makes thesystem usable only by root:
کد:
sysctl kernel.perf_event_paranoid=2
Unfortunately, this variable resets upon reboot. Here are three responses to that inconvenience:
- Manually change the variable after every boot
- Add theinstruction into a system RC script, OR
- Simply add the instruction into.
Redhat is now testing a fix, and CentOS will not be far behind. We apologize for any inconvenience.
The BetterLinux Team
پاسخ : CentOS kernel security exploit | RHEL 2.6.32.X | 15 May 2013