A suggested workaround on vulnerable systems is:
sysctl security.bsd.unprivileged_proc_debug=0

(which works by disabling some functionality of GDB to non-root users)

Also the use of jails or securelevel could reduce the potential damage.

Regards,
-- 
Steven Chamberlain
[email protected]


-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]
Archive: http://lists.debian.org/[email protected]

Reply via email to