Hello,
If local user privilege escalation and/or DoS is an issue for you
then you may wish to ensure your kernel is not vulnerable to:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547
"Multiple race conditions in fs/pipe.c in the Linux kernel
before 2.6.32-rc6 allow local users to cause a denial of
service (NULL pointer dereference and system crash) or gain
privileges by attempting to open an anonymous pipe via a
/proc/*/fd/ pathname."
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3621
"net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier
allows local users to cause a denial of service (system
hang) by creating an abstract-namespace AF_UNIX listening
socket, performing a shutdown operation on this socket, and
then performing a series of connect operations to this
socket."
amongst others.
Updates were recently pushed out to Debian and I assume others.
Cheers,
Andy
--
http://bitfolk.com/ -- No-nonsense VPS hosting
"What should one say after making love? ``Thank you'' seems too much.
``I'm sorry'' - somehow not enough." -- The League Against Tedium