On 08/13/2015 12:41 PM, Eero Volotinen wrote: > well, very sad to hear as I use commercial rhel 5 and paying for it.. > Well, in that case, I would recommend RHEL-6 or RHEL-7 for your RHEL-5 workloads :) > > 2015-08-13 19:57 GMT+03:00 Johnny Hughes <johnny@xxxxxxxxxx>: > >> On 08/12/2015 10:43 PM, Eero Volotinen wrote: >>> Hi List, >>> >>> Looks like this affects on centos 5 and is unpatched like on rhel 5? >>> >>> https://access.redhat.com/articles/1537873 >>> >>> Trying to test if this affects on centos 5. can someone compile this >>> exploit on centos 5? >>> https://www.qualys.com/research/security-advisories/roothelper.c >>> >>> any ideas how to compile it on centos 5? >> >> Red Hat says 2 things in that article: >> >> 1. It impacts RHEL5 (so also CentOS5) >> >> 2. They are NOT fixing it, at least not now. >> >> This is NOT the FIRST security update where this has happened. >> >> I would recommend you upgrade to CentOS-6 or CentOS-7 for all workloads >> that you can. >> >> Thanks, >> Johnny Hughes >> >> >> _______________________________________________ >> CentOS mailing list >> CentOS@xxxxxxxxxx >> http://lists.centos.org/mailman/listinfo/centos >> >> > _______________________________________________ > CentOS mailing list > CentOS@xxxxxxxxxx > http://lists.centos.org/mailman/listinfo/centos >
Attachment:
signature.asc
Description: OpenPGP digital signature
_______________________________________________ CentOS mailing list CentOS@xxxxxxxxxx http://lists.centos.org/mailman/listinfo/centos