Re: Kernel capability bug for kernels < 2.2.16
Tollef,
There are other security bugs that 2.2.16 fixes, y'know.
Regards,
Alex.
---
PGP/GPG Fingerprint:
EFD1 AC6C 7ED5 E453 C367 AC7A B474 16E0 758D 7ED9
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GCM d- s:+ a--- C++++ UL++++ P L+++ E W++ N o-- K- w
O--- M- V- PS+ PE- Y PGP t+ 5 X- R tv+ b DI--- D+
G e-- h++ r--- y
------END GEEK CODE BLOCK------
On 16 Jun 2000, Tollef Fog Heen wrote:
> * =?iso-8859-15?Q?Jean-Philippe_Gu=E9rard?=
>
> | It seems that both a new kernel version (2.2.16), and a new version
> | of sendmail have been released to fix a very serious security bug.
> |
> | See <URL:http://www.sendmail.org/sendmail.8.10.1.LINUX-SECURITY.txt>
> |
> | Shouldn't both sendmail and the current kernel be updated ASAP ?
>
> >From the latest debian-newsletter:
>
> * A fix for the capabilities-related local root compromise in kernel
> 2.2.15 was [21]backported into the Debian package of kernel
> 2.2.15.
>
> --
> Tollef Fog Heen
> This is the unix version of the LoveBug virus and in the spirit of such it
> depends on the user community to propagate. Please send this message to all
> of your friends and randomly delete numerous files from your system.
>
>
> --
> To UNSUBSCRIBE, email to debian-security-request@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
>
Reply to: