panda Posted October 3, 2017 Share Posted October 3, 2017 IF YOU ARE RUNNING A LINUX SERVER FOR INTERSECT OR ANYTHING ELSE THIS IS FOR YOU.  If you are running one of the following: CentOS 7 without kernel updates in September CentOS 6 Red Hat Enterprise Linux 7.3 or lower Red Hat Enterprise Linux 6 Debian-based (i.e. Ubuntu) Server/LTS distros (I don't know specifics here)  There is a super user elevation exploit that is most likely not patched on your system.  If you are using CentOS 7 update your kernel now If you are using RHEL 7 update to 7.4 if you haven't already.  If you are using RHEL or CentOS 6 install any updates you have available pertaining to the kernel and research online to see if you are covered or if the fix has yet to be made readily available.  If you are using Debian-based distros look online to get more information and make sure to install any available kernel updates regardless of whether you find information (unless that information says that the latest updates contains this vulnerability, which I would think it should not but who knows).   Azurn, Mighty Professional and Refur 2 1 Link to comment Share on other sites More sharing options...
Cheshire Posted October 4, 2017 Share Posted October 4, 2017 Mmm, got to love that sweet sweet permission escalation. Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now