Do you keep your kernel up-to-date? Well, you should already been running automated updates for your kernel, but if you haven’t, here’s a reason why. CVE-2010-3081.
This vulnerability allows any local user on a server to gain a root shell. The quickest fix is to get the latest kernel updates for your OS, which are out now and have patched this vulnerability. However vulnerability allows hackers to leave a backdoor running, even after the vulnerability has been patched. Rebooting the server after the kernel update will make sure its not running from memory. If a reboot is not possible, or you are looking for an option to do these upgrades without having to reboot your server, then you can check out Ksplice and how they handled this vulnerability.
About the Author:
Hamish joined Bobcares in July of 2004, and since then has grown to be well versed in the Control Panels and Operating systems used in the Web Hosting industry today. He is highly passionate about Linux and is a great evangelist of open-source. When not at work, he keeps himself busy populating this blog with both technical and non-technical posts. When he is not on his Xbox, he is an avid movie lover and critic