I suspect people are tracking this, and want to know about the process of the xen kernels.

https://bugzilla.redhat.com/show_bug.cgi?id=432517


  I tested right away, and the exploit works under Xen.

--
 Russell McOrmond, Internet Consultant: <http://www.flora.ca/>
 Please help us tell the Canadian Parliament to protect our property
 rights as owners of Information Technology. Sign the petition!
 http://www.digital-copyright.ca/petition/ict/

 "The government, lobbied by legacy copyright holders and hardware
  manufacturers, can pry my camcorder, computer, home theatre, or
  portable media player from my cold dead hands!"

--
Fedora-xen mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-xen

Reply via email to