Anybody updating their kernels because of the recently discovered kernel exploit?
http://lists.debian.org/debian-security-announce/debian-security-announce-2003/msg00212.html
The /. discussion on this topic is interesting. Lot's of 5s and 4s. A number of good links for those with security interests. http://developers.slashdot.org/developers/03/12/01/2133249.shtml?tid=106&tid=185&tid=90
I usually hold off on personal workstations for local-root exploits. If its remote I'll look into it, but if I'm the only user, and don't provide any external services, I'm usually not too worried about it.
Jeff
-- TriLUG mailing list : http://www.trilug.org/mailman/listinfo/trilug TriLUG Organizational FAQ : http://trilug.org/faq/ TriLUG Member Services FAQ : http://members.trilug.org/services_faq/ TriLUG PGP Keyring : http://trilug.org/~chrish/trilug.asc
