Am Mon, 17 Aug 2009 16:37:51 +0200 schrieb Thomas Bächler <[email protected]>:
> Another upstream release, please sign off. > > This also "fixes" the recent local root exploit, although (I like to > repeat that), it was NOT exploitable on our 2.6.30.4 kernel unless > you explicitly ran "echo 0 > /proc/sys/vm/mmap_min_addr". However, > the .30.5 kernel is safe from this exploit even if you run that > command. > > I only built x86_64 so far, will do i686 in a minute (takes forever > to build though). And - with our recent mirror trouble - it might > take a while to propagate through the tubes. > still alive with clean dmesg. signoff x86_64. -Andy

