A suggested workaround on vulnerable systems is: sysctl security.bsd.unprivileged_proc_debug=0
(which works by disabling some functionality of GDB to non-root users) Also the use of jails or securelevel could reduce the potential damage. Regards, -- Steven Chamberlain [email protected] -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected] Archive: http://lists.debian.org/[email protected]

