I suspect people are tracking this, and want to know about the
process of the xen kernels.
https://bugzilla.redhat.com/show_bug.cgi?id=432517
I tested right away, and the exploit works under Xen.
--
Russell McOrmond, Internet Consultant: <
http://www.flora.ca/>
Please help us tell the Canadian Parliament to protect our property
rights as owners of Information Technology. Sign the petition!
http://www.digital-copyright.ca/petition/ict/
"The government, lobbied by legacy copyright holders and hardware
manufacturers, can pry my camcorder, computer, home theatre, or
portable media player from my cold dead hands!"