Re: Heads up on local root escalation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Am 15.05.2014 um 11:22 schrieb Leon Fauster <leonfauster@xxxxxxxxxxxxxx>:
> Am 15.05.2014 um 07:23 schrieb Eero Volotinen <eero.volotinen@xxxxxx>:
>> 
>> 2014-05-12 21:13 GMT+03:00 James Hogarth <james.hogarth@xxxxxxxxx>:
>> 
>>> Remember to be especially aware if you have systems that can potentially
>>> have code uploaded and run (ftp to httpd vhost or improper php config and
>>> file ownership/permissions).
>>> 
>>> This does not affect el5 ... an el6 update is pending.
>>> 
>>> https://access.redhat.com/security/cve/CVE-2014-0196
>> 
>> "This issue does not affect the versions of Linux kernel packages as
>> shipped with Red Hat Enterprise Linux 6.4 EUS and Red Hat Enterprise Linux
>> 6, because they include backport of upstream commit c56a00a165 that
>> mitigates this issue."
> 
> cite: "This issue does affect the versions of the Linux kernel packages as shipped
> with Red Hat Enterprise Linux 6.2 AUS, Red Hat Enterprise Linux 6.3 EUS and Red Rat 
> Enterprise MRG 2, and we are currently working on corrected kernel packages that 
> address this issue."



https://rhn.redhat.com/errata/RHSA-2014-0512.html

--
LF


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux