On Mon, 2010-09-20 at 14:06 -0500, Robert G. (Doc) Savage wrote:
> I was concerned about this until I read this:
> 
> http://isc.sans.edu/diary.html?storyid=9574
> 
> I downloaded and ran the "diagnose-2010-3081" binary on my RHEL55 server
> and was relieved to see:
> 
>         $ ./diagnose-2010-3081 
>         Diagnostic tool for public CVE-2010-3081 exploit -- Ksplice,
>         Inc.
>         (see http://www.ksplice.com/uptrack/cve-2010-3081)
>         
>         $$$ Kernel release: 2.6.18-194.11.3.el5
>         $$$ Backdoor in LSM (1/3): checking...not present.
>         $$$ Backdoor in timer_list_fops (2/3): not available.
>         $$$ Backdoor in IDT (3/3): checking...not present.
>         
>         Your system is free from the backdoors that would be left in
>         memory
>         by the published exploit for CVE-2010-3081.

Looking at this again, I see that it only says I've not (yet) been
compromised. I'll be watching for the kernel update.

--Doc Savage, CISSP
  Fairview Heights, IL

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to