WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

Re: [Xen-users] has CVE-2010-3081 been patched in the xen.org kernels?

To: Luke S Crawford <lsc@xxxxxxxxx>
Subject: Re: [Xen-users] has CVE-2010-3081 been patched in the xen.org kernels?
From: Todd Deshane <deshantm@xxxxxxxxx>
Date: Tue, 28 Sep 2010 09:19:26 -0400
Cc: xen-users@xxxxxxxxxxxxxxxxxxx
Delivery-date: Tue, 28 Sep 2010 06:21:09 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:mime-version:received:reply-to :in-reply-to:references:from:date:message-id:subject:to:cc :content-type:content-transfer-encoding; bh=vurS/SV+KLEfD9hColR/rZGP3xVJ/jp1POfyGHPlK/4=; b=gvsj5oZ3VVc8imuE3gD+gMxOETdARzE3bI9z+Sfne3kXVQz7/RKwe+qlX3I3jGjoDf 2NhsE6/fExKAHaRcwAfc/7uDMALV0zWUqDQo0aEhIH6tARv22zuC3tbNZglv3pcCZhjg syKdGgaky8oC0cQmkKi80libFIzchQQ57VHJ4=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:reply-to:in-reply-to:references:from:date:message-id :subject:to:cc:content-type:content-transfer-encoding; b=kvqBQ/OAtwgBU7u5XKGs631LaeEfvPCIxsF2oviwcMHuPBuoVcqjF9LZRqLC7t7eR+ S/wvUO/S0bT3Yt+GXlsI4cdHdVk0aKznowKxhW4O4T4bzF+e1asqdtxk9kCB0Acj8OMO eBQqDcsiHQPh/OeeEV2kRPa6zdsddusE7MsSM=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <m3zkv2xbto.fsf@xxxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
References: <m3zkv2xbto.fsf@xxxxxxxxxxxxxxxxxx>
Reply-to: deshantm@xxxxxxxxx
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
On Tue, Sep 28, 2010 at 9:00 AM, Luke S Crawford <lsc@xxxxxxxxx> wrote:
>
>
> there's lots of talk of the Ac1db1tch3z exploit.   has this been pached
> in the xen.org dom0 kernels?  the xcp kernels?   I've been using the
> /proc/sys/fs/binfmt_misc/register  workaround but it'd be better to properly
> upgrade everything.
>

A recent root exploit is mentioned here:
http://xen.markmail.org/search/?q=%22xen+and+dom0+kernel+builds%22#query:%22xen%20and%20dom0%20kernel%20builds%22+page:1+mid:5tx6app7okp67cdi+state:results


-- 
Todd Deshane
http://todddeshane.net
http://runningxen.com

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>