On Fri, October 28, 2016 9:43 am, Johnny Hughes wrote:
On 10/22/2016 07:49 PM, Valeri Galtsev wrote:
Dear All,
I guess, we all have to urgently apply workaround, following, say, this:
https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7c...
At least those of us who still have important multi user machines running Linux. (Yes, me too, I do have a couple, thank goodness, the rest are already not ;-)
Have a productive weekend, everybody.
Valeri
And to close the book on this CVE, I just pushed the CentOS-5.11 kernel to fix this issue as well:
kernel-2.6.18-416.el5
Johnny, thanks a lot!!
(even though on my most ancient venerable couple of boxes still running CentOS 5 users can not execute anything of their own, so the boxes are immune to hack from inside, is still gives one great feeling to have kernel patched).
Thanks again for the great job you, guys are doing!
Valeri
So, the only thing we still have to release is a fixed kernel for the aarch64 AltArch SIG. And we are building a test kernel for that right now.
ppc64le, ppc64, i686, arm32 for CentOS-7 .. and all released arches for CentOS-5 and CentOS-6 ... now all have updates released.
Thanks, Johnny Hughes
CentOS mailing list CentOS@centos.org https://lists.centos.org/mailman/listinfo/centos
++++++++++++++++++++++++++++++++++++++++ Valeri Galtsev Sr System Administrator Department of Astronomy and Astrophysics Kavli Institute for Cosmological Physics University of Chicago Phone: 773-702-4247 ++++++++++++++++++++++++++++++++++++++++