Possible Kernel user escalation issue for CentOS-6.4

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



The following kernel has been built while waiting for upstream to
release a new kernel that addresses CVE-2013-2224:

http://people.centos.org/hughesjr/c6kernel/2.6.32-358.11.1.el6.cve20132224/

Please see this upstream bug for details:

https://bugzilla.redhat.com/show_bug.cgi?id=979936

=========================

Note:  This kernel has been minimally tested and is provided as is for
people who do not want to wait for the official kernel.  It is the
standard CentOS kernel with one added patch (
https://bugzilla.redhat.com/attachment.cgi?id=767364)

This kernel needs to be tested for fitness by each user before being
placed in production.  It is a best effort to mitigate an issue that can
cause local user escalation to root while waiting for upstream to fix
and QA the official kernel.  Use at your own risk.

Thanks,
Johnny Hughes

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos

[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux