[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Kernel capability bug for kernels < 2.2.16



Tollef,

There are other security bugs that 2.2.16 fixes, y'know.

Regards,

Alex.

---
PGP/GPG Fingerprint:
  EFD1 AC6C 7ED5 E453 C367  AC7A B474 16E0 758D 7ED9

-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GCM d- s:+ a--- C++++ UL++++ P L+++ E W++ N o-- K- w
O--- M- V- PS+ PE- Y PGP t+ 5 X- R tv+ b DI--- D+
G e-- h++ r--- y
------END GEEK CODE BLOCK------

On 16 Jun 2000, Tollef Fog Heen wrote:

> * =?iso-8859-15?Q?Jean-Philippe_Gu=E9rard?= 
> 
> | It seems that both a new kernel version (2.2.16), and a new version
> | of sendmail have been released to fix a very serious security bug.
> | 
> | See <URL:http://www.sendmail.org/sendmail.8.10.1.LINUX-SECURITY.txt>
> | 
> | Shouldn't both sendmail and the current kernel be updated ASAP ?
> 
> >From the latest debian-newsletter:
> 
>   * A fix for the capabilities-related local root compromise in kernel
>     2.2.15 was [21]backported into the Debian package of kernel
>     2.2.15.
> 
> -- 
> Tollef Fog Heen
> This is the unix version of the LoveBug virus and in the spirit of such it 
> depends on the user community to propagate. Please send this message to all 
> of your friends and randomly delete numerous files from your system.
> 
> 
> --  
> To UNSUBSCRIBE, email to debian-security-request@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
> 



Reply to: