Hi Troy,
On Nov 4, 2009, at 16:24, Troy Dawson wrote:
Recent RHEL releases?
No, not recent ... all
right. But for SL4 with the latest kernel (-98.0.15), it's just DOS
*if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is
not the default. SL5 with SELinux *dis*abled is safe as well, but if
SELinux is enforcing or permissive it's not, and nor is SL3.
If you have trouble getting all those kernels & modules & dependencies
out today, could your try to do SL5 first, then SL3, and then SL4?
Thanks,
Stephan
We already have the kernels all built, and are working on the
dependencies.
Troy
Faye Gibbins wrote:
Hi,
Any comment from the SL5 distro maintainers on this exploit
apparently in recent RHEL releases?
http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
Faye
--
__________________________________________________
Troy Dawson [email protected] (630)840-6468
Fermilab ComputingDivision/LSCS/CSI/USS Group
__________________________________________________
--
Stephan Wiesand
DESY - DV -
Platanenallee 6
15738 Zeuthen, Germany