Linux Kernel 2.6.7 Released 303
conrausch writes "German Heise News reports among others that the new Linux Kernel 2.6.7 was just released, and that it fixes the previously mentioned bug in the floating point exception handling. Whether or not you offer shell access to other people, get it now from kernel.org or one of the mirrors."
NVidia? (Score:2, Interesting)
Just curious (Score:5, Interesting)
Time for download then (Score:2, Interesting)
Anyone gotten Nvidia Nforce2 and Radeon 9800 Pro working with 3d Accel?
Obligatory luser question (Score:2, Interesting)
yum update kernel*
should install 2.6.7 right?
I'd much prefer to use an auto installer, I'm not ready for the full shebang yet.
Enlighten me here.
How is a full compile of the kernel done and how long would it take on a 3GHz,756RAM computer?
Problems with JFS? (Score:5, Interesting)
Anyone else unable to compile with JFS enabled as module?
Google shows no hits, and it's not important enough for me to track any further at the minute (since disabling JFS is an adequate work-around for me).....
Re:Now everyone... (Score:2, Interesting)
Or any way a remote user can run arbitrary code (not even as root.).
Not upgrading... (Score:3, Interesting)
If in doubt, don't upgrade unless you need new support for essential hardware or need to cover a security vulnerability. I leanred that after b0rking several systems trying to keep my kernel perpetually updated.
Is it just me, (Score:4, Interesting)
Re:what about 2.4? (Score:2, Interesting)
quick fix ! (Score:2, Interesting)
http://www.eweek.com/article2/0,1759,1612368,00
and just see how fast things get fixed on this side of the planet !!
mindboggling
most destructive? (Score:5, Interesting)
This one is 'only' a local DOS. Even if, as others say, crashed time is money, it could be much worse. At least you don't get 0wn3d, and you have a way to get back up by kicking users off, temporarily.
Drifting the topic, slightly...
This exploit, as well as the mremap ones, were derived from intimate examination of the source. So far, most of the Windows exploits have really been using 'features' for nefarious ends, not exploits of bugs. The recent Windows worms exploit a true bug in the security system, but I've heard that this one was developed from access to the source that leaked.
The Linux source has been out and discussed for over a decade, with plenty of time to find truly deep bugs. With the leak of WinNT/2k source, one hole was revealed fairly quickly. As people REALLY study that source, what else is going to emerge? (And how much code was really rewritten for XP vs reused?) Note that this isn't just a function of the source leak. As Microsoft shows more with Shared Source, more people will have the kind of access needed for this type of exploit.
MM patches question (Score:5, Interesting)
Re:Just curious (Score:3, Interesting)
What happened to "many eyes?" (Score:2, Interesting)
Re:Supermount (Score:3, Interesting)
From the FAQ:
Q: Will supermount be included in standard kernel?
A: Frankly speaking, I do not know. Version for 2.4 kernel is still more of a hack so I would not even try to ask for it. I still do not consider 2.6 version to be ready for inclusion in mainline - although it would definitely make some things easier. If anyone thinks supermount should be part of standard kernel - feel free to ask on LKML.