Hi,
I was wondering how others are dealing with this, beyond the runtime patch on 
bootup.  It seems like a tossup between grabbing/patching kernel source and 
waiting for the security update, does anyone know a rough eta on a safe gutsy 
kernel package?  Thanks for the help, this is new territory for me.

-- 
Local root exploit in kernel 2.6.17 - 2.6.24 (vmsplice)
https://bugs.launchpad.net/bugs/190587
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to