[Cyrix coma bug removed in 2.3.10-pre4]
> May I ask why?
Search me, with 2.3.10-pre4 applied, the exploit works again (as expected,
really); therefore you won't be able to run secure multi-user systems with
2.3.10+.
Interestingly, 2.3.6 changed from the official work-around (setting
the NO_LOCK bit, whatever that does) to something else, which I haven't managed
to figure out as I don't have the Cyrix 6x86 data books kicking around.
Did this patch get fed into 2.2.x as well? I guess you can see where my
thoughts are leading..
Meantime set6x86 can used on start-up to implement either of the two work
arounds.
-- "downtown baby its a million to one, you can even name your poison. standing in line by the exit sign, suicide alley is calling"- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/