Is there a breakdown published anywhere of all the cert advisories
specifically for 2.2.8? Thanks.
Steve
Sent via Deja.com http://www.deja.com/
Before you buy.
Steve
Sent via Deja.com http://www.deja.com/
Before you buy.
report this to the kernel mailing list, along with any information you can
give about what you were doing when it happened. read
/usr/src/linux/REPORTING-BUGS for more information...
[snip oops]
unless this happens more than once, it's unlikely to be worth worrying
yourself about, but the kernel developers will certainly want to know.
HTH
Cheers & God bless
SammyTheSnake
--
Linux, Hardware & Juggling specialist :-) | job, if you can help, e-mail me :)
Wheels: bike, 'ickle bike, and unicycle. | /o \/ Working on 3-5 ball tricks
2. Replace NIS+
3. CERT Advisory CA-2002-28 Trojan Horse Sendmail Distribution
4. OS/2 boot manager and LINUX
6. Stats comp.os.linux.networking (last 7 days)
7. CERT Advisory CA-94:09.bin.login.vulnerabili
10. HTTPD and CERT advisory CA-97.07
11. CERT Advisory CA-2002-25 & Sun Alert 46122
12. CERT Advisory - Solaris System Startup Vulnerability
13. CERT Advisory CA-2002-11 Heap Overflow in Cachefs Daemon (cachefsd)