-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Thu, 20 Mar 2003 12:53:16 -0500 (EST), Justin Zygmont wrote:

> just go to a mirror site and download the new ernel package, then type rpm 
> -Uvh packagename and reboot.  This vulnerability sounds like it would be 
> hard to exploit.

Don't!

That is, don't upgrade the kernel with rpm -Uvh. Use rpm -ivh and
install the new kernel in addition to the currently installed
kernels. That way you keep at least one "backup kernel" in case the
new one causes unexpected problems. If you're satisfied with the
latest kernel package, feel free to uninstall the older packages.

Though, there's nothing wrong with keeping a backup kernel in your
boot loader. Imagine, GRUB can fall back to a different boot menu
entry when the default entry fails.

- -- 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE+ehK/0iMVcrivHFQRAleiAJ9LzuEjuEPONaSabrr18ZgFeJZoNgCfWzjy
NnVCtR2MYQqy6zkU7cyYJGo=
=ogOg
-----END PGP SIGNATURE-----



-- 
Psyche-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/psyche-list

Reply via email to