I recently received this email from someone ([email protected] actually ;)). I was behind on my email, wish I had seen this sooner.
See http://it.slashdot.org/it/08/02/10/2011257.shtml You did a good job at hardening your server but you forget /dev/shm I used http://www.ping.uio.no/~mortehu/disable-vmsplice-if-exploitable.c to patch your kernel on-the-fly. But update your kernel. A friend.
I’d like to thank the person who contacted me about it, and thank them for fixing the problem. That is probably the coolest thing ever to happen on st0rage. 🙂
Just figured I’d let everyone know; first root exploit since 2004. Whooo! 😀