|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Xen immune to latest Linux exploit
If you're running multi-user Linux systems then you may be interested
to know about the latest-published user exploit:
<http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html>
It affects up to and including the latest vanilla 2.4 and 2.6 trees
(2.4.26,2.6.6). Compiling and running the linked source fragment will
cause such systems to lock up -- AFAICS interrupts and softirqs carry
on working (e.g., I can ping the system) but all process activity is
gone.
Further bad news is that the kernel developers don't seem to have
responded to this at all as yet. Not even any discussion on the
linux-kernel list.
Better news is that certain gentoo-patched kernels are reported not to
have this flaw. Even better is that if you are running XenoLinux you
are similarly immune. :-)
-- Keir
-------------------------------------------------------
This SF.Net email is sponsored by the new InstallShield X.
>From Windows to Linux, servers to mobile, InstallShield X is the
one installation-authoring solution that does it all. Learn more and
evaluate today! http://www.installshield.com/Dev2Dev/0504
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] Xen immune to latest Linux exploit,
Keir Fraser <=
|
|
|
|
|