Re: New kernel root exploit - Now what ?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hal,

Thank you.

I thought they stopped supporting Redhat though as of 2004 ?
I got a E-Mail about it, is this not the case ...... ?

Anyway thanks for the info, where about did you get this on the site so I
can use for future reference.

Jane-
----- Original Message ----- 
From: "Hal Burgiss" <hal@xxxxxxxxxx>
To: <redhat-list@xxxxxxxxxx>
Sent: Monday, January 05, 2004 6:45 PM
Subject: Re: New kernel root exploit - Now what ?


> On Mon, Jan 05, 2004 at 06:37:38PM -0000, Jane Regan wrote:
> > As redhat decided to stop supporting as of the 1st of Jan for my 7.3
> > system what are my option for patching the kernel against this root
> > vulnerability ?
> >
> > Need a response ASAP for obvious reasons ;)
>
> Anything like this (released with today's date):
>
>
> - ---------------------------------------------------------------------
>                    Red Hat Security Advisory
>
> Synopsis:          Updated kernel resolves security vulnerability
> Advisory ID:       RHSA-2003:417-01
> Issue date:        2004-01-05
> Updated on:        2004-01-05
> Product:           Red Hat Linux
> Keywords:
> Cross references:
> Obsoletes:
> CVE Names:         CAN-2003-0984 CAN-2003-0985
> - ---------------------------------------------------------------------
>
> 1. Topic:
>
> Updated kernel packages are now available that fix a security
> vulnerability which may allow local users to gain root privileges.
>
> 2. Relevant releases/architectures:
>
> Red Hat Linux 7.1 - athlon, i386, i586, i686
> Red Hat Linux 7.2 - athlon, i386, i586, i686
> Red Hat Linux 7.3 - athlon, i386, i586, i686
> Red Hat Linux 8.0 - athlon, i386, i586, i686
> Red Hat Linux 9 - athlon, i386, i586, i686
>
>
> [...]
>
>
> Red Hat Linux 7.3:
>
> SRPMS:
> ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.20-28.7.src.rpm
>
> athlon:
> ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.20-28.7.athlon.rpm
>
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.20-28.7.athlon.rpm
>
> i386:
> ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.20-28.7.i386.rpm
> ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.20-28.7.i386.rpm
> ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.20-28.7.i386.rpm
> ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.20-28.7.i386.rpm
>
> i586:
> ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.20-28.7.i586.rpm
> ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.20-28.7.i586.rpm
>
> i686:
> ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.20-28.7.i686.rpm
> ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.20-28.7.i686.rpm
> ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.20-28.7.i686.rpm
>
>
> -- 
> Hal Burgiss
>
>
>
> -- 
> redhat-list mailing list
> unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
> https://www.redhat.com/mailman/listinfo/redhat-list
>


-- 
redhat-list mailing list
unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe
https://www.redhat.com/mailman/listinfo/redhat-list

[Index of Archives]     [CentOS]     [Kernel Development]     [PAM]     [Fedora Users]     [Red Hat Development]     [Big List of Linux Books]     [Linux Admin]     [Gimp]     [Asterisk PBX]     [Yosemite News]     [Red Hat Crash Utility]


  Powered by Linux