Hi Troy, On Nov 4, 2009, at 16:24, Troy Dawson wrote: > Recent RHEL releases? > No, not recent ... all right. But for SL4 with the latest kernel (-98.0.15), it's just DOS *if* vm.mmap_min_addr is set to, say, 4096. Which, unfortunately, is not the default. SL5 with SELinux *dis*abled is safe as well, but if SELinux is enforcing or permissive it's not, and nor is SL3. If you have trouble getting all those kernels & modules & dependencies out today, could your try to do SL5 first, then SL3, and then SL4? Thanks, Stephan > We already have the kernels all built, and are working on the > dependencies. > > Troy > > Faye Gibbins wrote: >> Hi, >> Any comment from the SL5 distro maintainers on this exploit >> apparently in recent RHEL releases? >> http://www.theregister.co.uk/2009/11/03/linux_kernel_vulnerability/ >> Faye > > > -- > __________________________________________________ > Troy Dawson [log in to unmask] (630)840-6468 > Fermilab ComputingDivision/LSCS/CSI/USS Group > __________________________________________________ -- Stephan Wiesand DESY - DV - Platanenallee 6 15738 Zeuthen, Germany