On 15:06 22 Mar 2003, Lachlan Evans <[EMAIL PROTECTED]> wrote:
| On Fri, 2003-03-21 at 01:53, Justin Zygmont wrote:
| > just go to a mirror site and download the new ernel package, then type rpm
| > -Uvh packagename and reboot. This vulnerability sounds like it would be
| > hard to exploit.
|
|
On Fri, 2003-03-21 at 01:53, Justin Zygmont wrote:
> just go to a mirror site and download the new ernel package, then type rpm
> -Uvh packagename and reboot. This vulnerability sounds like it would be
> hard to exploit.
Hard to exploit? The exploit is out in the wild.
--
Psyche-list mai
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Thu, 20 Mar 2003 12:53:16 -0500 (EST), Justin Zygmont wrote:
> just go to a mirror site and download the new ernel package, then type rpm
> -Uvh packagename and reboot. This vulnerability sounds like it would be
> hard to exploit.
Don't!
That
just go to a mirror site and download the new ernel package, then type rpm
-Uvh packagename and reboot. This vulnerability sounds like it would be
hard to exploit.
On Thu, 20 Mar 2003, anthony baldwin wrote:
> I'm guessing everyone knows about the ptrace vulnerability.
> http://news.zdnet.co.
On Thu, 2003-03-20 at 10:04, anthony baldwin wrote:
> I'm guessing everyone knows about the ptrace vulnerability.
> http://news.zdnet.co.uk/story/0,,t278-s2132228,00.html
> I haven't the slightest idea what to do with this.
up2date will take care of this nicely.
--
Farewell neighbor. T
I'm guessing everyone knows about the ptrace vulnerability.
http://news.zdnet.co.uk/story/0,,t278-s2132228,00.html
I haven't the slightest idea what to do with this.
I went to the RH page and there are numerous patches and things available for
download but no instructions for their implementation