From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.2.5 (2008-06-10) on sa.int.altlinux.org X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=AWL,BAYES_00 autolearn=ham version=3.2.5 From: Sergey To: ALT Linux Sisyphus discussions Date: Wed, 15 May 2013 17:23:53 +0400 User-Agent: KMail/1.9.10 (enterprise35 0.20100827.1168748) References: <20130514233518.GU4388@osdn.org.ua> <20130515120154.GG13923@glebfm.office.altlinux.ru> <1327531368622493@web18h.yandex.ru> In-Reply-To: <1327531368622493@web18h.yandex.ru> X-KMail-QuotePrefix: > MIME-Version: 1.0 Content-Type: Text/Plain; charset="koi8-r" Content-Transfer-Encoding: 8bit Content-Disposition: inline Message-Id: <201305151723.53872.a_s_y@sama.ru> Subject: Re: [sisyphus] I: kernel local root vulnerability (CVE-2013-2094) X-BeenThere: sisyphus@lists.altlinux.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: ALT Linux Sisyphus discussions List-Id: ALT Linux Sisyphus discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 15 May 2013 13:24:08 -0000 Archived-At: List-Archive: List-Post: On Wednesday 15 May 2013, Mike Lykov wrote: > а что делать пользователям ядра kernel-image-ovz-el , например ? Читать sysadmins@lists. Там Michael Shigorin ночью ещё решение с OpenNet привёл: sysctl kernel.perf_event_paranoid=2 echo "kernel.perf_event_paranoid=2" >> /etc/sysctl.d/CVE-2013-2094.conf -- С уважением, Сергей a_s_y@sama.ru