> From: [email protected] [mailto:[email protected]] On Behalf
> Of Charles Jones
> 
> reboot. Granted a reboot is required to update the kernel itself, but
> if your server is decently hardened and firewalled, exactly which
> kernel exploits are you vulnerable to?

I remember this one explicitly, because it happened on that server that my
boss never updated.  It's not necessarily an exploit, but it's a bug.

When you "ls -l" or "top" on that machine, for some reason, most of the
usernames would display correctly.  But a few usernames here and there would
refuse to display as usernames, and only display as UID's.  There was no
cause for it.  It's something that disappeared after reboot.  (Or update, I
don't know which.)

So, when you're applying hundreds of bugfixes and patches ... What does each
one do?  Are they security vulnerabilities, or some little aesthetic
nonsense?  Who cares.  You know you don't want whatever it was that was
broken.

_______________________________________________
Tech mailing list
[email protected]
http://lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to