Re: Mitigation for latest Linux kernel exploit?
On Fri, Aug 14, 2009 at 05:07:09PM +0200, Morten W. Petersen wrote: Hi, I've seen this for RedHat on mitigating the latest kernel exploit: https://bugzilla.redhat.com/show_bug.cgi?id=516949#c10 Is there some similar instructions for Debian? Somewhat similar, by Marco d'Itri . Though he uses slightly more brute-force methods to make sure those modules won't get loaded until you install a fixed kernel version: http://blog.bofh.it/debian/id_294 -- Tzafrir Cohen | tzaf...@jabber.org | VIM is http://tzafrir.org.il || a Mutt's tzaf...@cohens.org.il || best ICQ# 16849754 || friend -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Mitigation for latest Linux kernel exploit?
Hi, I've seen this for RedHat on mitigating the latest kernel exploit: https://bugzilla.redhat.com/show_bug.cgi?id=516949#c10 Is there some similar instructions for Debian? Thanks, Morten -- Morten W. Petersen Manager Nidelven IT Ltd Phone: +47 45 44 00 69 Email: mor...@nidelven-it.no -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Re: Mitigation for latest Linux kernel exploit?
On 2009-08-14 10:07, Morten W. Petersen wrote: Hi, I've seen this for RedHat on mitigating the latest kernel exploit: https://bugzilla.redhat.com/show_bug.cgi?id=516949#c10 Is there some similar instructions for Debian? Why shouldn't RH's instructions will work with Debian? (A home PC behind a good firewall shouldn't be in any real risk, though, unless you run your own vulnerable daemons visible to the world via port-forwarding from the router.) -- Scooty Puff, Sr The Doom-Bringer -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org