On Tue, Sep 21, 2010 at 1:45 AM, Christopher Chan <christopher.chan at bradbury.edu.hk> wrote: > Karanbir Singh wrote: >> On 09/21/2010 12:32 AM, Christopher Chan wrote: >>> Will there be a special case for this particular issue like an early >>> release of a Centos fixed kernel instead of waiting for the powers that >>> be at Redhat? >> >> There is a kernel in the c5-testing repo ( details in the issue report ) >> that Tru put together. You should make a site specific decision on the >> impact on services local to you and go with that. >> >> We've done some basic testing with this kernel and things *seem to be* >> fine. >> > > I suppose that is in regards to the exploit itself (nevermind the rest > so long as it don't start changing bits here and there)? > _______________________________________________ > CentOS mailing list > CentOS at centos.org > http://lists.centos.org/mailman/listinfo/centos > Does anyone know what this exploit does, exactly. And which 64bit kernels are vulnrable? -- Kind Regards Rudi Ahlers SoftDux Website: http://www.SoftDux.com Technical Blog: http://Blog.SoftDux.com Office: 087 805 9573 Cell: 082 554 7532