vulnerability in 8.6

2016-11-07 Thread Ozgur
eturn my user (not root) and I downloaded the exploit script and run it: $ gcc -pthread dirtyc0w.c -o dirtyc0w $ ./dirtyc0w foo blabla $ cat foo blabla what is the suggestion on this exploit? Regards, ~Ozgur

Re: vulnerability in 8.6

2016-11-07 Thread Ozgur
http://security.debian.org/ jessie/updates main contrib deb http://ftp.debian.org/debian/ jessie-updates main contrib deb-src http://ftp.debian.org/debian/ jessie-updates main contrib deb http://ftp.debian.org/debian/ jessie main contrib deb-src http://ftp.debian.org/debian/ jessie main contrib Regards, ~ Ozgur

Re: vulnerability in 8.6

2016-11-07 Thread Ozgur
Hello, I think, I'm doing to wrong. My Debian system sources.list file as follow and I don't seen linux image "3.16.36-1+deb8u2" Thanks for all help, Regards, ~ Ozgur $ sudo cat /etc/apt/sources.list deb http://security.debian.org/ jessie/updates main

Re: vulnerability in 8.6

2016-11-07 Thread Ozgur
n.org/debian/ jessie-updates/main amd64 Packages Regards, Ozgur 2016-11-07 20:18 GMT+03:00 Mike Oliver : > Can we confirm whether or not the kernel is already installed? Is the > newest version in the kernel in /boot? It's unclear from what's been said > if the system has

Re: bind9 security problem?

2006-11-05 Thread Ozgur Karatas
Hello, your named.conf add logging { category lame-servers {null; }; }; like is but. regards.. ,''`. Ozgur Karatas : :' : [EMAIL PROTECTED] `. `' http://www.ozgurkaratas.com `-Powered By Debian GNU\Linux Adrian von Bidder <[EMAIL PROTECTED]> demiş ki: