If you''re running multi-user Linux systems then you may be interested to know about the latest-published user exploit: <http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html> It affects up to and including the latest vanilla 2.4 and 2.6 trees (2.4.26,2.6.6). Compiling and running the linked source fragment will cause such systems to lock up -- AFAICS interrupts and softirqs carry on working (e.g., I can ping the system) but all process activity is gone. Further bad news is that the kernel developers don''t seem to have responded to this at all as yet. Not even any discussion on the linux-kernel list. Better news is that certain gentoo-patched kernels are reported not to have this flaw. Even better is that if you are running XenoLinux you are similarly immune. :-) -- Keir ------------------------------------------------------- This SF.Net email is sponsored by the new InstallShield X.>From Windows to Linux, servers to mobile, InstallShield X is theone installation-authoring solution that does it all. Learn more and evaluate today! http://www.installshield.com/Dev2Dev/0504 _______________________________________________ Xen-devel mailing list Xen-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/xen-devel