[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] has CVE-2010-3081 been patched in the xen.org kernels?

  • To: Luke S Crawford <lsc@xxxxxxxxx>
  • From: Todd Deshane <deshantm@xxxxxxxxx>
  • Date: Tue, 28 Sep 2010 09:19:26 -0400
  • Cc: xen-users@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Tue, 28 Sep 2010 06:21:09 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:reply-to:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:content-transfer-encoding; b=kvqBQ/OAtwgBU7u5XKGs631LaeEfvPCIxsF2oviwcMHuPBuoVcqjF9LZRqLC7t7eR+ S/wvUO/S0bT3Yt+GXlsI4cdHdVk0aKznowKxhW4O4T4bzF+e1asqdtxk9kCB0Acj8OMO eBQqDcsiHQPh/OeeEV2kRPa6zdsddusE7MsSM=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

On Tue, Sep 28, 2010 at 9:00 AM, Luke S Crawford <lsc@xxxxxxxxx> wrote:
> there's lots of talk of the Ac1db1tch3z exploit.   has this been pached
> in the xen.org dom0 kernels?  the xcp kernels?   I've been using the
> /proc/sys/fs/binfmt_misc/register  workaround but it'd be better to properly
> upgrade everything.

A recent root exploit is mentioned here:

Todd Deshane

Xen-users mailing list



Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.