[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Xen immune to latest Linux exploit



If you're running multi-user Linux systems then you may be interested
to know about the latest-published user exploit:
 <http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html>

It affects up to and including the latest vanilla 2.4 and 2.6 trees
(2.4.26,2.6.6). Compiling and running the linked source fragment will
cause such systems to lock up -- AFAICS interrupts and softirqs carry
on working (e.g., I can ping the system) but all process activity is
gone. 

Further bad news is that the kernel developers don't seem to have
responded to this at all as yet. Not even any discussion on the
linux-kernel list.

Better news is that certain gentoo-patched kernels are reported not to
have this flaw. Even better is that if you are running XenoLinux you
are similarly immune. :-)

 -- Keir


-------------------------------------------------------
This SF.Net email is sponsored by the new InstallShield X.
>From Windows to Linux, servers to mobile, InstallShield X is the
one installation-authoring solution that does it all. Learn more and
evaluate today! http://www.installshield.com/Dev2Dev/0504
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxxx
https://lists.sourceforge.net/lists/listinfo/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.