James Matthews ha scritto:
> There is a very large issue with all people running VPS machines that
> are waiting for upgrades.
>
>
Looks like, at least for openvz, virtualized machines are safe
http://openvz.org/pipermail/users/2009-August/002961.html
James Matthews wrote:
> There is a very large issue with all people running VPS machines that
> are waiting for upgrades.
>
>
Why is that, there is NO upgrade for this issue from upstream. We can
not possibly release something before it is released by Red Hat does.
signature.asc
Description
> There is a very large issue with all people running VPS machines that are
> waiting for upgrades.
Why are VPS's any more affected than bare-metal machines?
It will be greatly ironic if Redhat release the fix after they release 5.4, or
as part of 5.4. I will try not to say I told you so.
There is a very large issue with all people running VPS machines that are
waiting for upgrades.
On Fri, Aug 14, 2009 at 2:44 PM, Akemi Yagi wrote:
> On Fri, Aug 14, 2009 at 8:15 AM, Akemi Yagi wrote:
> > Upstream bugzilla to follow:
> >
> > https://bugzilla.redhat.com/show_bug.cgi?id=516949
On Fri, Aug 14, 2009 at 8:15 AM, Akemi Yagi wrote:
> Upstream bugzilla to follow:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=516949
Just a note to say that the issue is also being tracked in the CentOS forums:
http://www.centos.org/modules/newbb/viewtopic.php?topic_id=21740&forum=42
So, if
Upstream bugzilla to follow:
https://bugzilla.redhat.com/show_bug.cgi?id=516949
Akemi
___
CentOS mailing list
CentOS@centos.org
http://lists.centos.org/mailman/listinfo/centos
Hi again.
> alias net-pf-24 # PPPoE
Sorry, typo in pf-24.
grep -q '^alias net-pf-3 off' /etc/modprobe.conf || \
echo 'alias net-pf-3 off' >> /etc/modprobe.conf
grep -q '^alias net-pf-4 off' /etc/modprobe.conf || \
echo 'alias net-pf-4 off' >> /etc/modprobe.conf
grep -q '^alias net-pf-5 off' /et
On Friday 14 August 2009, Kai Schaetzl wrote:
> Marcus Moeller wrote on Fri, 14 Aug 2009 14:24:39 +0200:
> > The only workaroud that is known to me atm is to disable the affected
> > kernel modules (which should be handled with care as some of them may
> > provide necessary functionality in your op
Hi again,
>> The only workaroud that is known to me atm is to disable the affected
>> kernel modules (which should be handled with care as some of them may
>> provide necessary functionality in your operating environment):
>
> If vm.mmap_min_addr is > 0 you are also not affected, at least not by t
Have you tried the exploit on CentOS 5?
http://grsecurity.net/~spender/wunderbar_emporium.tgz
I only have access to a Fedora 9 machine right now and the exploit is
working with all the modules from the first mail disabled in
modprobe.conf
[r...@localhost ~]# uname -a
Linux localhost.localdomain
Marcus Moeller wrote on Fri, 14 Aug 2009 14:24:39 +0200:
> The only workaroud that is known to me atm is to disable the affected
> kernel modules (which should be handled with care as some of them may
> provide necessary functionality in your operating environment):
If vm.mmap_min_addr is > 0 you
11 matches
Mail list logo