SCIENTIFIC-LINUX-USERS Archives

October 2007

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Connie Sieh <[log in to unmask]>
Reply To:
Connie Sieh <[log in to unmask]>
Date:
Tue, 2 Oct 2007 10:03:46 -0500
Content-Type:
TEXT/PLAIN
Parts/Attachments:
TEXT/PLAIN (35 lines)
On Tue, 2 Oct 2007, Beyerle Urs wrote:

> Hi,
>
> this is really a serious security problem. And you should install and reboot into the
> latest SL kernels:
>
> SL3: kernel-2.4.21-52.EL
> SL4: kernel-2.6.9-55.0.9.EL
> SL5: kernel-2.6.18-8.1.14.el5

These were all released last Friday September 28.  Note that the auto yum 
nightly cron job does NOT upgrade kernels automatically.

-Connie Sieh
>
> However, this only affects x86_64 systems.
>
> Urs
>
>
>
>
> LEROY Christine wrote:
>> Hello,
>>
>> Concerning this vulnerability:
>> http://www.certa.ssi.gouv.fr/site/CERTA-2007-AVI-416/CERTA-2007-AVI-416.html
>> Is there a patch for kernel version 2.6.9-42 and 2.4.21-37 we are using?
>>
>> Thanks in advance
>> Cheers
>> Christine
>

ATOM RSS1 RSS2