[CentOS] CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw

Valeri Galtsev galtsev at kicp.uchicago.edu
Fri Oct 28 14:50:27 UTC 2016


On Fri, October 28, 2016 9:43 am, Johnny Hughes wrote:
> On 10/22/2016 07:49 PM, Valeri Galtsev wrote:
>> Dear All,
>>
>> I guess, we all have to urgently apply workaround, following, say, this:
>>
>> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/
>>
>> At least those of us who still have important multi user machines
>> running
>> Linux. (Yes, me too, I do have a couple, thank goodness, the rest are
>> already not ;-)
>>
>> Have a productive weekend, everybody.
>>
>> Valeri
>>
>
> And to close the book on this CVE, I just pushed the CentOS-5.11 kernel
> to fix this issue as well:
>
> kernel-2.6.18-416.el5

Johnny, thanks a lot!!

(even though on my most ancient venerable couple of boxes still running
CentOS 5 users can not execute anything of their own, so the boxes are
immune to hack from inside, is still gives one great feeling to have
kernel patched).

Thanks again for the great job you, guys are doing!

Valeri

>
> So, the only thing we still have to release is a fixed kernel for the
> aarch64 AltArch SIG.  And we are building a test kernel for that right
> now.
>
> ppc64le, ppc64, i686, arm32 for CentOS-7 .. and all released arches for
> CentOS-5 and CentOS-6 ... now all have updates released.
>
> Thanks,
> Johnny Hughes
>
>
> _______________________________________________
> CentOS mailing list
> CentOS at centos.org
> https://lists.centos.org/mailman/listinfo/centos
>


++++++++++++++++++++++++++++++++++++++++
Valeri Galtsev
Sr System Administrator
Department of Astronomy and Astrophysics
Kavli Institute for Cosmological Physics
University of Chicago
Phone: 773-702-4247
++++++++++++++++++++++++++++++++++++++++



More information about the CentOS mailing list