Originally posted by: between
if you haven't restarted your machine for months and months, then you're running a kernel with a bunch of known/ published security vulnerabilities which might be a bad idea in some circumstances. unless of course you are clever enough to update your kernel directly in memory without rebooting it.
if you haven't restarted your machine for months and months, then you're running a kernel with a bunch of known/ published security vulnerabilities which might be a bad idea in some circumstances. unless of course you are clever enough to update your kernel directly in memory without rebooting it.
Originally posted by: Nothinman
if you haven't restarted your machine for months and months, then you're running a kernel with a bunch of known/ published security vulnerabilities which might be a bad idea in some circumstances. unless of course you are clever enough to update your kernel directly in memory without rebooting it.
Most kernel vulnerabilities are local only so unless you've got shell accounts belonging to untrusted people it's not a big deal. And there's nothing clever about using kexec although I don't think it's been tested enough to trust in production.
Originally posted by: kedlav
Originally posted by: Nothinman
if you haven't restarted your machine for months and months, then you're running a kernel with a bunch of known/ published security vulnerabilities which might be a bad idea in some circumstances. unless of course you are clever enough to update your kernel directly in memory without rebooting it.
Most kernel vulnerabilities are local only so unless you've got shell accounts belonging to untrusted people it's not a big deal. And there's nothing clever about using kexec although I don't think it's been tested enough to trust in production.
Yep, restricted shells, good security policies, and good user management will take you a lot further than a six month patch schedule in the *nix world...
kexec allows you to reboot directly into a kernel image loaded from disk, it doesn't patch the currently running kernel. For that, you need to directly manipulate kernel memory. a kexec kernel reboot destroys the uptimes people seem to be so proud of in this thread. maybe you are thinking of ksplice, which is a pretty new tool that automates linux kernel hotpatching for security updates.
as for the importance of updating kernels, my belief is that where security is an issue, security in depth implies you cover all your bases, including kernel patches.
In a corporate environment its probably smarter to update for those reasons, but home environment you can get away with it. I upgrade the hardware on my servers more often then the software. The beauty of Linux is you can transplant the OS to a new PC and it will boot up most of the time.
