On Mon, 2010-09-20 at 14:06 -0500, Robert G. (Doc) Savage wrote: > I was concerned about this until I read this: > > http://isc.sans.edu/diary.html?storyid=9574 > > I downloaded and ran the "diagnose-2010-3081" binary on my RHEL55 server > and was relieved to see: > > $ ./diagnose-2010-3081 > Diagnostic tool for public CVE-2010-3081 exploit -- Ksplice, > Inc. > (see http://www.ksplice.com/uptrack/cve-2010-3081) > > $$$ Kernel release: 2.6.18-194.11.3.el5 > $$$ Backdoor in LSM (1/3): checking...not present. > $$$ Backdoor in timer_list_fops (2/3): not available. > $$$ Backdoor in IDT (3/3): checking...not present. > > Your system is free from the backdoors that would be left in > memory > by the published exploit for CVE-2010-3081.
Looking at this again, I see that it only says I've not (yet) been compromised. I'll be watching for the kernel update. --Doc Savage, CISSP Fairview Heights, IL _______________________________________________ rhelv5-list mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhelv5-list
