Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <408501d24098$402503e0$c06f0ba0$@bigblue.net.au>
Date: Thu, 17 Nov 2016 17:02:59 +1100
From: "Alan Williams" <ajw@...blue.net.au>
To: <owl-users@...ts.openwall.com>
Subject: How can I upgrade this against C.O.W. on Owls with kernel version  2.6.18-194.11.3.el5.028stab071.5.owl1

I have found a number of owl installs in the infrastructure I now manage and
I am wondering how to deal with them in respect of the dirty c.o.w.
vulnerability,  given that they are all quite old.

 

The four machines list the following two kernel versions:

 

2.6.18-194.11.3.el5.028stab071.5.owl1 #1 SMP Sat Sep 25 02:43:36 MSD 2010
x86_64 GNU/Linux

2.6.18-348.3.1.el5.028stab106.2.owl1 #1 SMP Mon Apr 8 03:39:13 MSK 2013
x86_64 GNU/Linux

 

Many thank

Alan

 


Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.