from The Register:
Linux developers have issued a critical update for the open-source OS after researchers uncovered a vulnerability in its kernel that puts most versions built in the past eight years at risk of complete takeover.
The bug involves the way kernel-level routines such as sock_sendpage react when they are left unimplemented. Instead of linking to a corresponding placeholder, (for example, sock_no_accept), the function pointer is left uninitialized. Sock_sendpage doesn’t always validate the pointer before dereferencing it, leaving the OS open to local privilege escalation that can completely compromise the underlying machine.
From all sorts of vulnerabilities of the Linux operating system, this is the most severe. Unfortunately, the details of the bug has been announced before the vendors patching their systems. The hacker can easily penetrate the system access that the previous user privileges to be root privileges. Fortunately, this vulnerabilities occurred in the local operating system, not remotely. We still can say “fortunately”
Update and Patch your system with the distro’s way.