On Fri, Aug 14, 2009 at 05:07:09PM +0200, Morten W. Petersen wrote: > Hi, > > I've seen this for RedHat on mitigating the latest kernel exploit: > > https://bugzilla.redhat.com/show_bug.cgi?id=516949#c10 > > Is there some similar instructions for Debian?
Somewhat similar, by Marco d'Itri . Though he uses slightly more brute-force methods to make sure those modules won't get loaded until you install a fixed kernel version: http://blog.bofh.it/debian/id_294 -- Tzafrir Cohen | tzaf...@jabber.org | VIM is http://tzafrir.org.il | | a Mutt's tzaf...@cohens.org.il | | best ICQ# 16849754 | | friend -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org