-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Thu, 20 Mar 2003 12:53:16 -0500 (EST), Justin Zygmont wrote: > just go to a mirror site and download the new ernel package, then type rpm > -Uvh packagename and reboot. This vulnerability sounds like it would be > hard to exploit. Don't! That is, don't upgrade the kernel with rpm -Uvh. Use rpm -ivh and install the new kernel in addition to the currently installed kernels. That way you keep at least one "backup kernel" in case the new one causes unexpected problems. If you're satisfied with the latest kernel package, feel free to uninstall the older packages. Though, there's nothing wrong with keeping a backup kernel in your boot loader. Imagine, GRUB can fall back to a different boot menu entry when the default entry fails. - -- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE+ehK/0iMVcrivHFQRAleiAJ9LzuEjuEPONaSabrr18ZgFeJZoNgCfWzjy NnVCtR2MYQqy6zkU7cyYJGo= =ogOg -----END PGP SIGNATURE----- -- Psyche-list mailing list Psyche-list@xxxxxxxxxx https://listman.redhat.com/mailman/listinfo/psyche-list