Hi Troy,

On Nov 4, 2009, at 16:24, Troy Dawson wrote:

Recent RHEL releases?
No, not recent ... all

right. But for SL4 with the latest kernel (-98.0.15), it's just DOS *if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is not the default. SL5 with SELinux *dis*abled is safe as well, but if SELinux is enforcing or permissive it's not, and nor is SL3.

If you have trouble getting all those kernels & modules & dependencies out today, could your try to do SL5 first, then SL3, and then SL4?

Thanks,
        Stephan

We already have the kernels all built, and are working on the dependencies.

Troy

Faye Gibbins wrote:
Hi,
Any comment from the SL5 distro maintainers on this exploit apparently in recent RHEL releases?
http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
Faye


--
__________________________________________________
Troy Dawson  [email protected]  (630)840-6468
Fermilab  ComputingDivision/LSCS/CSI/USS Group
__________________________________________________

--
Stephan Wiesand
  DESY - DV -
  Platanenallee 6
  15738 Zeuthen, Germany

Reply via email to