[CentOS-devel] heads up: CVE-2008-0600 kernel root exploit

Mon Feb 11 01:17:27 UTC 2008
Baird, Josh <jbaird at follett.com>

It actually made my 2.6.18-53.1.4.el5 x86 box panic.
 
Josh

________________________________

From: centos-devel-bounces at centos.org on behalf of Matthew Miller
Sent: Sun 2/10/2008 5:54 PM
To: The CentOS developers mailing list.
Subject: [CentOS-devel] heads up: CVE-2008-0600 kernel root exploit




This has a trivially-available local root exploit code, and is already
generating a bit of community panic. I expect we'll be seeing an update RSN.

<https://bugzilla.redhat.com/show_bug.cgi?id=432251>

--
Matthew Miller           mattdm at mattdm.org          <http://mattdm.org/>
Boston University Linux      ------>              <http://linux.bu.edu/>
_______________________________________________
CentOS-devel mailing list
CentOS-devel at centos.org
http://lists.centos.org/mailman/listinfo/centos-devel


-------------- next part --------------
A non-text attachment was scrubbed...
Name: winmail.dat
Type: application/ms-tnef
Size: 4159 bytes
Desc: not available
URL: <http://lists.centos.org/pipermail/centos-devel/attachments/20080210/95cc6440/attachment-0007.bin>