Am 15.05.2014 um 11:22 schrieb Leon Fauster <leonfaus...@googlemail.com>: > Am 15.05.2014 um 07:23 schrieb Eero Volotinen <eero.voloti...@iki.fi>: >> >> 2014-05-12 21:13 GMT+03:00 James Hogarth <james.hoga...@gmail.com>: >> >>> Remember to be especially aware if you have systems that can potentially >>> have code uploaded and run (ftp to httpd vhost or improper php config and >>> file ownership/permissions). >>> >>> This does not affect el5 ... an el6 update is pending. >>> >>> https://access.redhat.com/security/cve/CVE-2014-0196 >> >> "This issue does not affect the versions of Linux kernel packages as >> shipped with Red Hat Enterprise Linux 6.4 EUS and Red Hat Enterprise Linux >> 6, because they include backport of upstream commit c56a00a165 that >> mitigates this issue." > > cite: "This issue does affect the versions of the Linux kernel packages as > shipped > with Red Hat Enterprise Linux 6.2 AUS, Red Hat Enterprise Linux 6.3 EUS and > Red Rat > Enterprise MRG 2, and we are currently working on corrected kernel packages > that > address this issue."
https://rhn.redhat.com/errata/RHSA-2014-0512.html -- LF _______________________________________________ CentOS mailing list CentOS@centos.org http://lists.centos.org/mailman/listinfo/centos