[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-users] patch against general kernel NULL pointer vulnurability


  • To: "netz-haut - stephan seitz" <s.seitz@xxxxxxxxxxxx>, <xen-users@xxxxxxxxxxxxxxxxxxx>
  • From: "netz-haut - stephan seitz" <s.seitz@xxxxxxxxxxxx>
  • Date: Fri, 14 Aug 2009 18:16:29 +0200
  • Cc:
  • Delivery-date: Fri, 14 Aug 2009 09:17:30 -0700
  • List-id: Xen user discussion <xen-users.lists.xensource.com>
  • Thread-index: Acoc1YEPv1IfZojIEd7GhwBQBPU9LAAJJo2Q
  • Thread-topic: [Xen-users] patch against general kernel NULL pointer vulnurability

Hi,

I modified the original patch to fit into a recent linux-2.6.18-xen.hg
recently pulled from http://xenbits.xensource.com/linux-2.6.18-xen.hg 

It’s available at the same URL: 
http://www.schwarz-mode.de/files/xen-newer-stuff/

Regards,

Stephan


> Due to http://lwn.net/Articles/347006/
> or http://lists.grok.org.uk/pipermail/full-disclosure/2009-
> August/070197.html
> 
> virtually all x86 and x86_64 kernels are vulnerable.
> 
> I patched and build a 2.6.29-xen-r4 kernel which has been posted on
> this list
> a few weeks ago. I'm using this kernel after a lot of testing
> productive.
> 
> D/L here: http://www.schwarz-mode.de/files/xen-newer-stuff/
> 
> Original patch:
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-
> 2.6.git;a=blobdiff;f=net/socket.c;h=6d47165590473daa4990bf69b0435d5c49b
> 41302;hp=791d71a36a93dfec5166fe05e2e0cb394cfa904b;hb=e694958388c5014838
> 9b0e9b9e9e8945cf0f1b98;hpb=a3620f7545344f932873bf98fbdf416b49409c8e
> 
> I'll build a 2.6.18.8-xen from xensource repo also, but as I'm
> currently running
> most machines with 2.6.29-xen-r4 this is not on my prio list.


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.