Hi Troy,
On Nov 4, 2009, at 16:24, Troy Dawson wrote:
> Recent RHEL releases?
> No, not recent ... all
right. But for SL4 with the latest kernel (-98.0.15), it's just DOS
*if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is
not the default. SL5 with SELinux *dis*abled is safe as well, but if
SELinux is enforcing or permissive it's not, and nor is SL3.
If you have trouble getting all those kernels & modules & dependencies
out today, could your try to do SL5 first, then SL3, and then SL4?
Thanks,
Stephan
> We already have the kernels all built, and are working on the
> dependencies.
>
> Troy
>
> Faye Gibbins wrote:
>> Hi,
>> Any comment from the SL5 distro maintainers on this exploit
>> apparently in recent RHEL releases?
>> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
>> Faye
>
>
> --
> __________________________________________________
> Troy Dawson [log in to unmask] (630)840-6468
> Fermilab ComputingDivision/LSCS/CSI/USS Group
> __________________________________________________
--
Stephan Wiesand
DESY - DV -
Platanenallee 6
15738 Zeuthen, Germany
|