The exploit is no longer functional after changing the kernel.perf_event_paranoid parameter:
# sysctl kernel.perf_event_paranoid=2
However, this does not correct the underlying vulnerability, thus
rebooting the server onto the new kernel ASAP is highly recommended.
Update(s):
Date: 2013-05-16 10:18:28 UTC During a manual soft reboot, some installations of OVH Release 2 (based on gentoo) are blocking after shutdown instead of restarting. This is due to the devtmpfs still inknown to gentoo scripts. The fix is simple:
sed -i \"s/devfs|tmpfs/devfs|devtmpfs|tmpfs/g\" /etc/init.d/halt.sh