Hi,
Any comment from the SL5 distro maintainers on this exploit
apparently in recent RHEL releases?
http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
Faye
--
-
Faye Gibbins, Computing Officer (Infrastructure
Email from Troy yesterday indicated that SL will have this patch available
soon, within the next couple of days.
Steve
On Wed, 4 Nov 2009, Faye Gibbins wrote:
Hi,
Any comment from the SL5 distro maintainers on this exploit apparently in
recent RHEL releases?
Recent RHEL releases?
No, not recent ... all
We already have the kernels all built, and are working on the dependencies.
Troy
Faye Gibbins wrote:
Hi,
Any comment from the SL5 distro maintainers on this exploit
apparently in recent RHEL releases?
On Wed, Nov 4, 2009 at 1:14 AM, Faye Gibbins
fgibb...@staffmail.ed.ac.uk wrote:
Hi,
Any comment from the SL5 distro maintainers on this exploit apparently in
recent RHEL releases?
The vulnerability has been there for a long time. It has only just
been found by someone who works on the
Hi Troy,
On Nov 4, 2009, at 16:24, Troy Dawson wrote:
Recent RHEL releases?
No, not recent ... all
right. But for SL4 with the latest kernel (-98.0.15), it's just DOS
*if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is
not the default. SL5 with SELinux *dis*abled is safe
Stephan Wiesand wrote:
Hi Troy,
On Nov 4, 2009, at 16:24, Troy Dawson wrote:
Recent RHEL releases?
No, not recent ... all
right. But for SL4 with the latest kernel (-98.0.15), it's just DOS
*if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is
not the default. SL5 with