Lorem ipsum dolor sit amet, consectetur adipiscing elit lobortis arcu enim urna adipiscing praesent velit viverra sit semper lorem eu cursus vel hendrerit elementum morbi curabitur etiam nibh justo, lorem aliquet donec sed sit mi dignissim at ante massa mattis.
Vitae congue eu consequat ac felis placerat vestibulum lectus mauris ultrices cursus sit amet dictum sit amet justo donec enim diam porttitor lacus luctus accumsan tortor posuere praesent tristique magna sit amet purus gravida quis blandit turpis.
At risus viverra adipiscing at in tellus integer feugiat nisl pretium fusce id velit ut tortor sagittis orci a scelerisque purus semper eget at lectus urna duis convallis. porta nibh venenatis cras sed felis eget neque laoreet suspendisse interdum consectetur libero id faucibus nisl donec pretium vulputate sapien nec sagittis aliquam nunc lobortis mattis aliquam faucibus purus in.
Nisi quis eleifend quam adipiscing vitae aliquet bibendum enim facilisis gravida neque. Velit euismod in pellentesque massa placerat volutpat lacus laoreet non curabitur gravida odio aenean sed adipiscing diam donec adipiscing tristique risus. amet est placerat in egestas erat imperdiet sed euismod nisi.
“Nisi quis eleifend quam adipiscing vitae aliquet bibendum enim facilisis gravida neque velit euismod in pellentesque massa placerat”
Eget lorem dolor sed viverra ipsum nunc aliquet bibendum felis donec et odio pellentesque diam volutpat commodo sed egestas aliquam sem fringilla ut morbi tincidunt augue interdum velit euismod eu tincidunt tortor aliquam nulla facilisi aenean sed adipiscing diam donec adipiscing ut lectus arcu bibendum at varius vel pharetra nibh venenatis cras sed felis eget dolor cosnectur drolo.
It has been mentioned in many places on the web, that a vulnerability in the 32-bit compatibility mode of the current Linux kernel (and previous versions) for 64-bit systems can be exploited to escalate privileges.The folks over at Ksplice have put together a patch that fixes this vulnerability, and a tool to check if your system has been compromised. More detail is available on the Ksplice Blog.
You can read the Redhat Bugzilla info associated with CVE-2010-3081 here: https://bugzilla.redhat.com/show_bug.cgi?id=634457.Details from the bug reportThe Red Hat Enterprise Linux 4 kernel is not affected by the publicly circulated exploit, but we plan to backport the missing compat_alloc_user_space() sanity checks in the future Red Hat Enterprise Linux 4 update.This issue has been addressed in following products: Red Hat Enterprise Linux 5Via RHSA-2010:0704 https://rhn.redhat.com/errata/RHSA-2010-0704.html
The following link has information related to Fedora 12/13/14: https://admin.fedoraproject.org/updates/search/CVE-2010-3081
You can read the Ubuntu Security Notice here: http://www.ubuntu.com/usn/usn-988-1USN-988-1: Linux kernel vulnerabilities===========================================================Ubuntu Security Notice USN-988-1 September 17, 2010linux, linux-source-2.6.15 vulnerabilitiesCVE-2010-3081, CVE-2010-3301===========================================================A security issue affects the following Ubuntu releases:Ubuntu 6.06 LTSUbuntu 8.04 LTSUbuntu 9.04Ubuntu 9.10Ubuntu 10.04 LTS
Amazon Web Services (AWS CVE-2010-3081) has additional detail on their security bulletins pageAmazon Linux AMI Security Advisory: ALAS-2010-1 Advisory Release Date: September 17, 2010 References: CVE-2010-3081, CVE-2010-3301 Severity: Important
Further details about the exploit here: http://seclists.org/fulldisclosure/2010/Sep/268.And more about the vulnerability description here: http://sota.gen.nz/compat1/.If you are a customer of MNX Solutions and your systems support Ksplice, we have already patched your server. All systems enrolled in our Linux Server Management solution include KSplice at no additional charge. If you have any questions about your server status, please open a support case.KSplice reacted very quickly to this situation, and is continuing to prove to it's customers that it is a great solution for reasons just like this!
Click here for additional detail or request a proposal so you can start focusing on growing your business, rather than supporting your servers.