A suggested workaround on vulnerable systems is: sysctl security.bsd.unprivileged_proc_debug=0
(which works by disabling some functionality of GDB to non-root users) Also the use of jails or securelevel could reduce the potential damage. Regards, -- Steven Chamberlain ste...@pyro.eu.org -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org