[arch-dev-public] [signoff] kernel26 2.6.30.5-1
Another upstream release, please sign off. This also "fixes" the recent local root exploit, although (I like to repeat that), it was NOT exploitable on our 2.6.30.4 kernel unless you explicitly ran "echo 0 > /proc/sys/vm/mmap_min_addr". However, the .30.5 kernel is safe from this exploit even if you run that command. I only built x86_64 so far, will do i686 in a minute (takes forever to build though). And - with our recent mirror trouble - it might take a while to propagate through the tubes.
Am Mon, 17 Aug 2009 16:37:51 +0200 schrieb Thomas Bächler <thomas@archlinux.org>:
Another upstream release, please sign off.
This also "fixes" the recent local root exploit, although (I like to repeat that), it was NOT exploitable on our 2.6.30.4 kernel unless you explicitly ran "echo 0 > /proc/sys/vm/mmap_min_addr". However, the .30.5 kernel is safe from this exploit even if you run that command.
I only built x86_64 so far, will do i686 in a minute (takes forever to build though). And - with our recent mirror trouble - it might take a while to propagate through the tubes.
still alive with clean dmesg. signoff x86_64. -Andy
Am Montag 17 August 2009 18:39:36 schrieb Andreas Radke:
still alive with clean dmesg. signoff x86_64.
here, too. -- Pierre Schmitz, http://users.archlinux.de/~pierre
Thomas Bächler schrieb:
Another upstream release, please sign off.
This also "fixes" the recent local root exploit, although (I like to repeat that), it was NOT exploitable on our 2.6.30.4 kernel unless you explicitly ran "echo 0 > /proc/sys/vm/mmap_min_addr". However, the .30.5 kernel is safe from this exploit even if you run that command.
I only built x86_64 so far, will do i686 in a minute (takes forever to build though). And - with our recent mirror trouble - it might take a while to propagate through the tubes.
i686 is up, but untested, I have no machine that runs a native i686 system.
On Mon, Aug 17, 2009 at 1:02 PM, Thomas Bächler<thomas@archlinux.org> wrote:
Thomas Bächler schrieb:
Another upstream release, please sign off.
This also "fixes" the recent local root exploit, although (I like to repeat that), it was NOT exploitable on our 2.6.30.4 kernel unless you explicitly ran "echo 0 > /proc/sys/vm/mmap_min_addr". However, the .30.5 kernel is safe from this exploit even if you run that command.
I only built x86_64 so far, will do i686 in a minute (takes forever to build though). And - with our recent mirror trouble - it might take a while to propagate through the tubes.
i686 is up, but untested, I have no machine that runs a native i686 system.
signoff i686
Am Dienstag 18 August 2009 09:26:51 schrieb Thomas Bächler:
Eric Bélanger schrieb:
signoff i686
One more for i686, so I can move this, please.
signoff-i686 -- Pierre Schmitz, http://users.archlinux.de/~pierre
participants (4)
-
Andreas Radke
-
Eric Bélanger
-
Pierre Schmitz
-
Thomas Bächler