[SATLUG] FYI: 64 bit machines are getting rooted
dondavis at reglue.org
Tue Sep 21 08:25:40 CDT 2010
The only untrusted code I've run (outside of a chroot) was the binary
from ksplice to see if I was at risk for the exploit. I'll sure feel
silly if that was a trojan...
On 09/21/2010 08:16 AM, Jonathan Hull wrote:
> On Mon, Sep 20, 2010 at 4:32 PM, Todd W. Bucy <r3d91ll at grandecom.net> wrote:
>> this article was on slashdot today. This was in the new late last week
>> but it seems that they now have a tool to inspect your machine.
>> SATLUG mailing list
>> SATLUG at satlug.org
>> http://alamo.satlug.org/mailman/listinfo/satlug to manage/unsubscribe
>> Powered by Rackspace (www.rackspace.com)
> It almost sounds like a scare story to me. Sure, it's a privilege
> exploit, but those have existed before and I'm sure we will find more
> in the future. If you are running untrusted code on your system, root
> or not, you should rethink your security. IMO anyway.
More information about the SATLUG