-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On June 11, 2004 08:46, s. keeling wrote:
> That still took some Debian servers down (remote kernel
> exploit), and Gentoo's servers were compromised (through not too close
> checking of the parentage of some packages, I understand).  Gnu's
> servers took a very hard hit last year too.  No backups, either.  Oops.

it's probably important to note that while these attacks took advantage of 
flaws in the Linux kernel, they also required local access which was aquired 
by compromising other user-space services on the machine. the kernel itself 
has been pretty safe from non-local attacks against it in recent times...

- -- 
Aaron J. Seigo
GPG Fingerprint: 8B8B 2209 0C6F 7C47 B1EA  EE75 D6B7 2EB1 A7F1 DB43
while (!horse()); cart();
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2-rc1-SuSE (GNU/Linux)

iD8DBQFAzdJf1rcusafx20MRAuaOAJ92EpUgUk8Gjax76DWKcHNOfJ0KBACgno29
8u1rJdFoUDy9cFi2Bc3MJ9o=
=tQEx
-----END PGP SIGNATURE-----

_______________________________________________
clug-talk mailing list
[EMAIL PROTECTED]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca

Reply via email to