{"id":2492,"date":"2012-01-27T02:52:26","date_gmt":"2012-01-27T08:52:26","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=2492"},"modified":"2012-05-05T20:59:43","modified_gmt":"2012-05-06T01:59:43","slug":"linux-vendors-rush-to-patch-privilege-escalation-flaw-after-root-exploits-emerge","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=2492","title":{"rendered":"Linux vendors rush to patch privilege escalation flaw after root exploits emerge"},"content":{"rendered":"<blockquote><p>According to Carsten Eiram, the chief security specialist at vulnerability research firm Secunia, the flaw was introduced in the Linux kernel code in March 2011 and affects versions 2.6.39 and above. &#8220;Any Linux distributions providing these kernel versions should be vulnerable,&#8221; Eiram said.<\/p><\/blockquote>\n<p>via <a href=\"http:\/\/www.techworld.com.au\/article\/413300\/linux_vendors_rush_patch_privilege_escalation_flaw_after_root_exploits_emerge\">Linux vendors rush to patch privilege escalation flaw after root exploits emerge &#8211; security, secunia, Exploits \/ vulnerabilities &#8211; Malware &#8211; Security &#8211; Techworld<\/a>.<\/p>\n<p>Fedora 14 is stuck on 2.6.35 something.\u00a0 This shouldn&#8217;t affect CentOS builds either.\u00a0 Sometimes it&#8217;s beneficial not to upgrade the OS!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Carsten Eiram, the chief security specialist at vulnerability research firm Secunia, the flaw was introduced in the Linux kernel code in March 2011 and affects versions 2.6.39 and above. &#8220;Any Linux distributions providing these kernel versions should be &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=2492\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[35],"tags":[427,217,61],"class_list":["post-2492","post","type-post","status-publish","format-standard","hentry","category-operating-systems","tag-exploit","tag-kernel","tag-linux"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/2492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2492"}],"version-history":[{"count":3,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/2492\/revisions"}],"predecessor-version":[{"id":4067,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/2492\/revisions\/4067"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2492"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}