The advisory for this vulnerability has been updated to include a
suggested workaround:
Preventing the RDS kernel module from loading is an effective
workaround. This can be accomplished by executing the following
command as root:
echo alias net-pf-21 off /etc/modprobe.d/disable-rds
In
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
VSR Security Advisory
http://www.vsecurity.com/
-
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Advisory Name: Linux RDS Protocol Local Privilege Escalation
Release