It actually made my 2.6.18-53.1.4.el5 x86 box panic. Josh ________________________________ From: centos-devel-bounces at centos.org on behalf of Matthew Miller Sent: Sun 2/10/2008 5:54 PM To: The CentOS developers mailing list. Subject: [CentOS-devel] heads up: CVE-2008-0600 kernel root exploit This has a trivially-available local root exploit code, and is already generating a bit of community panic. I expect we'll be seeing an update RSN. <https://bugzilla.redhat.com/show_bug.cgi?id=432251> -- Matthew Miller mattdm at mattdm.org <http://mattdm.org/> Boston University Linux ------> <http://linux.bu.edu/> _______________________________________________ CentOS-devel mailing list CentOS-devel at centos.org http://lists.centos.org/mailman/listinfo/centos-devel -------------- next part -------------- A non-text attachment was scrubbed... Name: winmail.dat Type: application/ms-tnef Size: 4159 bytes Desc: not available URL: <http://lists.centos.org/pipermail/centos-devel/attachments/20080210/95cc6440/attachment-0007.bin>