Hello Mike;
thanks for all help and I checked /boot
$ ls /boot/
config-3.16.0-4-amd64 grub initrd.img-3.16.0-4-amd64
System.map-3.16.0-4-amd64 vmlinuz-3.16.0-4-amd64
$ sudo update-grub
[sudo] password for x:
Generating grub configuration file ...
Found background image: /usr/share/images/des
Please reply to the list, not directly to me.
On 07-11-2016 16:49, Ozgur wrote:
> Hello Eduardo;
>
>
> $ uname -ar
> Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19)
> x86_64 GNU/Linux
>
> $ apt-cache policy linux-image-3.16.0-4-amd64
> linux-image-3.16.0-4-amd64:
> Installed:
Can we confirm whether or not the kernel is already installed? Is the
newest version in the kernel in /boot? It's unclear from what's been
said if the system has even been rebooted into the updated kernel.
On 11/07/2016 08:55 AM, Eduardo M KALINOWSKI wrote:
On Seg, 07 Nov 2016, Ozgur wrote:
Also hopefully obvious, but since this is a kernel update it probably
wouldn't take effect until after a reboot, anyway. So, testing before
rebooting is silly.
On Nov 7, 2016 9:01 AM, "Ozgur" wrote:
Hello,
I think, I'm doing to wrong. My Debian system sources.list file as follow
and I don't see
On Seg, 07 Nov 2016, Ozgur wrote:
I updated the Debian system and again exploit it successful.
No, you didn't. (Well, kinda)
$ uname -ar
Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) x86_64
GNU/Linux
That's not the latest version, and specifically is not the one in
wh
> $ sudo apt-cache search linux-image
> linux-headers-3.16.0-4-amd64 - Header files for Linux 3.16.0-4-amd64
> linux-image-3.16.0-4-amd64 - Linux 3.16 for 64-bit PCs
> linux-image-3.16.0-4-amd64-dbg - Debugging symbols for Linux 3.16.0-4-amd64
> linux-image-amd64 - Linux for 64-bit PCs (meta-pack
Hello,
I think, I'm doing to wrong. My Debian system sources.list file as follow
and I don't seen linux image "3.16.36-1+deb8u2"
Thanks for all help,
Regards,
~ Ozgur
$ sudo cat /etc/apt/sources.list
deb http://security.debian.org/ jessie/updates main contrib
deb-src http://security.debian.org
Hi
maybe when you do the upgrade
keeps back the linux-image* package.
the one it fix this vulnerability is:
linux-image-3.16.0-4-amd64 3.16.36-1+deb8u2amd64Linux
3.16 for 64-bit PCs
Linux mail 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u2 (2016-10-19) x86_64
GNU/Linux
On 11/07/2016 09:45 AM, Ozgur wrote:
> $ uname -ar
> Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03)
> x86_64 GNU/Linux
The update/upgrade didn't grab the latest security update for the
kernel. The version with the fix for CVE-2016-5195 (Dirty Cow) is
3.16.36-1+deb8u2
--
Nich
Hello Salvatore,
I updated the Debian system and again exploit it successful.
$ sudo apt-get update
$ sudo apt-get upgrade
$ sudo apt-get dist-upgrade
$ cat /etc/debian_version
8.6
$ uname -ar
Linux x 3.16.0-4-amd64 #1 SMP Debian 3.16.36-1+deb8u1 (2016-09-03) x86_64
GNU/Linux
Test:
$ ./dirtyc0
On 7 Nov 2016, at 16:54, Ozgur wrote:
>
> Linux 3.16.0-4-amd64 (Debian 8.6)
>
Always test security vulnerabilities on a fully patched system. According to
https://security-tracker.debian.org/tracker/CVE-2016-5195 this was fixed in
version 3.16.36-1+deb2 of the linux package.
Kind regards,
Hi,
On Mon, Nov 07, 2016 at 06:54:55PM +0300, Ozgur wrote:
> Hi all,
>
> I have been reading security articles and I seen a test with Debian Linux
> vulnerability of kernel. I tested and given a successful exploit.
>
> List a vuln:
>
> https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
>
Hi all,
I have been reading security articles and I seen a test with Debian Linux
vulnerability of kernel. I tested and given a successful exploit.
List a vuln:
https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs
My testing:
dirtycow.c (status: success)
cowroot.c (status: success)
For ex
13 matches
Mail list logo