[svlug] Security exposure in kernels 2.2.x
xtifr at dsp.net
Fri Jun 9 21:39:21 PDT 2000
On Fri, Jun 09, 2000 at 08:31:44AM -0700, Rick Moen wrote:
> In case anyone missed it, if you're running a 2.2 kernel, you have a
> couple of security holes.
There's been no official announcement yet, but when I asked the Debian
security guys, I was told that the fix for this has been backported to
the 2.2.15 kernels in potato.
Anyone who is using Debian potato may want to upgrade their kernel to
the latest 2.2.15 (or roll your own, either from Debian's patched
2.2.15 sources or with 2.2.16). And you may want to ask around and
not just take my word for it. I'd like to see someone provoked into
making an official announcement... :-)
Chris Waters xtifr at dsp.net | I have a truly elegant proof of the
or xtifr at debian.org | above, but it is too long to fit into
http://www.dsp.net/xtifr | this .signature file.
More information about the svlug