NOTICE: This version of the NSF Unidata web site (archive.unidata.ucar.edu) is no longer being updated.
Current content can be found at unidata.ucar.edu.

To learn about what's going on, see About the Archive Site.

Re: [ldm-users] kernel flaw exploit

Not that you shouldn't apply the patch but unfortunately that only prevents
a single exploit PoC. There have been others published that use methods
which bypass the patch.

Just wish this CVE wasn't 5 days old already without a kernel fix for us
CentOS users. Other vendors appear to have already released updated kernels.

On Mon, Oct 24, 2016 at 10:41 AM, Brian Werner <brian.werner@xxxxxxx> wrote:

> For the time being I have found this in regards to CentOS:
> https://www.centos.org/forums/viewtopic.php?t=59782
>
> No real patch but it is a temporary band-aid.
>
> Brian Werner
> iLab
> Lead Engineer, National MesoNet Project304.368.6122brian.werner@xxxxxxx
>
> On 10/24/2016 12:26 PM, Ryan Hickman wrote:
>
> Patrick,
>
> Many thanks for the heads up. RHEL 7 appears to have been addressed by
> RedHat (https://rhn.redhat.com/errata/RHSA-2016-2098.html). Waiting on
> this to make its way to CentOS channels.
>
> On Mon, Oct 24, 2016 at 9:29 AM, Patrick L. Francis <wxprofessor@xxxxxxxxx
> > wrote:
>
>>
>> A serious kernel flaw we should all be aware of:
>> https://www.engadget.com/2016/10/24/linux-exploit-gives-any-
>> user-full-access-in-five-seconds/
>>
>> and patch recommendations:
>> https://bobcares.com/blog/dirty-cow-vulnerability/
>>
>>
>> cheers,
>>
>> --patrick
>>
>> ----------------------------------------------------
>> Patrick L. Francis
>> Vice President of Research & Development
>> AerisWeather.com
>>
>> wxprofessor@xxxxxxxxx
>> facebook.com/wxprofessor
>> ----------------------------------------------------
>>
>> _______________________________________________
>> NOTE: All exchanges posted to Unidata maintained email lists are
>> recorded in the Unidata inquiry tracking system and made publicly
>> available through the web.  Users who post to any of the lists we
>> maintain are reminded to remove any personal information that they
>> do not want to be made public.
>>
>>
>> ldm-users mailing list
>> ldm-users@xxxxxxxxxxxxxxxx
>> For list information or to unsubscribe,  visit:
>> http://www.unidata.ucar.edu/mailing_lists/
>>
>
> ------------------------------
>
> Spam <https://filter.gst.com/canit/b.php?i=01RXss5f9&m=7cd11639125b&c=s>
> Not spam
> <https://filter.gst.com/canit/b.php?i=01RXss5f9&m=7cd11639125b&c=n>
> Forget previous vote
> <https://filter.gst.com/canit/b.php?i=01RXss5f9&m=7cd11639125b&c=f>
>
>
> _______________________________________________
> NOTE: All exchanges posted to Unidata maintained email lists are
> recorded in the Unidata inquiry tracking system and made publicly
> available through the web.  Users who post to any of the lists we
> maintain are reminded to remove any personal information that they
> do not want to be made public.
>
>
> ldm-users mailing listldm-users@xxxxxxxxxxxxxxxx
> For list information or to unsubscribe,  visit: 
> http://www.unidata.ucar.edu/mailing_lists/
>
>
>
> _______________________________________________
> NOTE: All exchanges posted to Unidata maintained email lists are
> recorded in the Unidata inquiry tracking system and made publicly
> available through the web.  Users who post to any of the lists we
> maintain are reminded to remove any personal information that they
> do not want to be made public.
>
>
> ldm-users mailing list
> ldm-users@xxxxxxxxxxxxxxxx
> For list information or to unsubscribe,  visit:
> http://www.unidata.ucar.edu/mailing_lists/
>
  • 2016 messages navigation, sorted by:
    1. Thread
    2. Subject
    3. Author
    4. Date
    5. ↑ Table Of Contents
  • Search the ldm-users archives: