A suggested workaround on vulnerable systems is:
sysctl security.bsd.unprivileged_proc_debug=0

(which works by disabling some functionality of GDB to non-root users)

Also the use of jails or securelevel could reduce the potential damage.

Regards,
-- 
Steven Chamberlain
ste...@pyro.eu.org


-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to