[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Xen immune to latest Linux exploit
If you're running multi-user Linux systems then you may be interested to know about the latest-published user exploit: <http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html> It affects up to and including the latest vanilla 2.4 and 2.6 trees (2.4.26,2.6.6). Compiling and running the linked source fragment will cause such systems to lock up -- AFAICS interrupts and softirqs carry on working (e.g., I can ping the system) but all process activity is gone. Further bad news is that the kernel developers don't seem to have responded to this at all as yet. Not even any discussion on the linux-kernel list. Better news is that certain gentoo-patched kernels are reported not to have this flaw. Even better is that if you are running XenoLinux you are similarly immune. :-) -- Keir ------------------------------------------------------- This SF.Net email is sponsored by the new InstallShield X. >From Windows to Linux, servers to mobile, InstallShield X is the one installation-authoring solution that does it all. Learn more and evaluate today! http://www.installshield.com/Dev2Dev/0504 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |