> From: [email protected] [mailto:[email protected]] On Behalf > Of Charles Jones > > reboot. Granted a reboot is required to update the kernel itself, but > if your server is decently hardened and firewalled, exactly which > kernel exploits are you vulnerable to?
I remember this one explicitly, because it happened on that server that my boss never updated. It's not necessarily an exploit, but it's a bug. When you "ls -l" or "top" on that machine, for some reason, most of the usernames would display correctly. But a few usernames here and there would refuse to display as usernames, and only display as UID's. There was no cause for it. It's something that disappeared after reboot. (Or update, I don't know which.) So, when you're applying hundreds of bugfixes and patches ... What does each one do? Are they security vulnerabilities, or some little aesthetic nonsense? Who cares. You know you don't want whatever it was that was broken. _______________________________________________ Tech mailing list [email protected] http://lopsa.org/cgi-bin/mailman/listinfo/tech This list provided by the League of Professional System Administrators http://lopsa.org/
