SCIENTIFIC-LINUX-USERS Archives

November 2009

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Stephan Wiesand <[log in to unmask]>
Reply To:
Stephan Wiesand <[log in to unmask]>
Date:
Wed, 4 Nov 2009 18:27:36 +0100
Content-Type:
text/plain
Parts/Attachments:
text/plain (43 lines)
Hi Troy,

On Nov 4, 2009, at 16:24, Troy Dawson wrote:

> Recent RHEL releases?
> No, not recent ... all

right. But for SL4 with the latest kernel (-98.0.15), it's just DOS  
*if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is  
not the default. SL5 with SELinux *dis*abled is safe as well, but if  
SELinux is enforcing or permissive it's not, and nor is SL3.

If you have trouble getting all those kernels & modules & dependencies  
out today, could your try to do SL5 first, then SL3, and then SL4?

Thanks,
	Stephan

> We already have the kernels all built, and are working on the  
> dependencies.
>
> Troy
>
> Faye Gibbins wrote:
>> Hi,
>>  Any comment from the SL5 distro  maintainers on this exploit  
>> apparently in recent RHEL releases?
>> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/
>> Faye
>
>
> -- 
> __________________________________________________
> Troy Dawson  [log in to unmask]  (630)840-6468
> Fermilab  ComputingDivision/LSCS/CSI/USS Group
> __________________________________________________

-- 
Stephan Wiesand
   DESY - DV -
   Platanenallee 6
   15738 Zeuthen, Germany

ATOM RSS1 RSS2