Re: vulnerability in 8.6

2016-11-07 Thread Ozgur
Hello Mike; thanks for all help and I checked /boot $ ls /boot/ config-3.16.0-4-amd64 grub initrd.img-3.16.0-4-amd64 System.map-3.16.0-4-amd64 vmlinuz-3.16.0-4-amd64 $ sudo update-grub [sudo] password for x: Generating grub configuration file ... Found background image: /usr/share/images/des

Re: vulnerability in 8.6

2016-11-07 Thread Eduardo M KALINOWSKI
Please reply to the list, not directly to me. On 07-11-2016 16:49, Ozgur wrote: > Hello Eduardo; > > > $ uname -ar > Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) > x86_64 GNU/Linux > > $ apt-cache policy linux-image-3.16.0-4-amd64 > linux-image-3.16.0-4-amd64: > Installed:

Re: vulnerability in 8.6

2016-11-07 Thread Mike Oliver
Can we confirm whether or not the kernel is already installed? Is the newest version in the kernel in /boot? It's unclear from what's been said if the system has even been rebooted into the updated kernel. On 11/07/2016 08:55 AM, Eduardo M KALINOWSKI wrote: On Seg, 07 Nov 2016, Ozgur wrote:

Re: vulnerability in 8.6

2016-11-07 Thread Andrew Deck
Also hopefully obvious, but since this is a kernel update it probably wouldn't take effect until after a reboot, anyway. So, testing before rebooting is silly. On Nov 7, 2016 9:01 AM, "Ozgur" wrote: Hello, I think, I'm doing to wrong. My Debian system sources.list file as follow and I don't see

Re: vulnerability in 8.6

2016-11-07 Thread Eduardo M KALINOWSKI
On Seg, 07 Nov 2016, Ozgur wrote: I updated the Debian system and again exploit it successful. No, you didn't. (Well, kinda) $ uname -ar Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) x86_64 GNU/Linux That's not the latest version, and specifically is not the one in wh

Re: vulnerability in 8.6

2016-11-07 Thread Matias Mucciolo
> $ sudo apt-cache search linux-image > linux-headers-3.16.0-4-amd64 - Header files for Linux 3.16.0-4-amd64 > linux-image-3.16.0-4-amd64 - Linux 3.16 for 64-bit PCs > linux-image-3.16.0-4-amd64-dbg - Debugging symbols for Linux 3.16.0-4-amd64 > linux-image-amd64 - Linux for 64-bit PCs (meta-pack

Re: vulnerability in 8.6

2016-11-07 Thread Ozgur
Hello, I think, I'm doing to wrong. My Debian system sources.list file as follow and I don't seen linux image "3.16.36-1+deb8u2" Thanks for all help, Regards, ~ Ozgur $ sudo cat /etc/apt/sources.list deb http://security.debian.org/ jessie/updates main contrib deb-src http://security.debian.org

Re: vulnerability in 8.6

2016-11-07 Thread Matias Mucciolo
Hi maybe when you do the upgrade keeps back the linux-image* package. the one it fix this vulnerability is: linux-image-3.16.0-4-amd64 3.16.36-1+deb8u2amd64Linux 3.16 for 64-bit PCs Linux mail 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64 GNU/Linux

Re: vulnerability in 8.6

2016-11-07 Thread Nicholas Luedtke
On 11/07/2016 09:45 AM, Ozgur wrote: > $ uname -ar > Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) > x86_64 GNU/Linux The update/upgrade didn't grab the latest security update for the kernel. The version with the fix for CVE-2016-5195 (Dirty Cow) is 3.16.36-1+deb8u2 -- Nich

Re: vulnerability in 8.6

2016-11-07 Thread Ozgur
Hello Salvatore, I updated the Debian system and again exploit it successful. $ sudo apt-get update $ sudo apt-get upgrade $ sudo apt-get dist-upgrade $ cat /etc/debian_version 8.6 $ uname -ar Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) x86_64 GNU/Linux Test: $ ./dirtyc0

Re: vulnerability in 8.6

2016-11-07 Thread Richard van den Berg
On 7 Nov 2016, at 16:54, Ozgur wrote: > > Linux 3.16.0-4-amd64 (Debian 8.6) > Always test security vulnerabilities on a fully patched system. According to https://security-tracker.debian.org/tracker/CVE-2016-5195 this was fixed in version 3.16.36-1+deb2 of the linux package. Kind regards,

Re: vulnerability in 8.6

2016-11-07 Thread Salvatore Bonaccorso
Hi, On Mon, Nov 07, 2016 at 06:54:55PM +0300, Ozgur wrote: > Hi all, > > I have been reading security articles and I seen a test with Debian Linux > vulnerability of kernel. I tested and given a successful exploit. > > List a vuln: > > https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs >

vulnerability in 8.6

2016-11-07 Thread Ozgur
Hi all, I have been reading security articles and I seen a test with Debian Linux vulnerability of kernel. I tested and given a successful exploit. List a vuln: https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs My testing: dirtycow.c (status: success) cowroot.c (status: success) For ex