eturn my user (not root) and I downloaded the exploit script and
run it:
$ gcc -pthread dirtyc0w.c -o dirtyc0w
$ ./dirtyc0w foo blabla
$ cat foo
blabla
what is the suggestion on this exploit?
Regards,
~Ozgur
http://security.debian.org/ jessie/updates main contrib
deb http://ftp.debian.org/debian/ jessie-updates main contrib
deb-src http://ftp.debian.org/debian/ jessie-updates main contrib
deb http://ftp.debian.org/debian/ jessie main contrib
deb-src http://ftp.debian.org/debian/ jessie main contrib
Regards,
~ Ozgur
Hello,
I think, I'm doing to wrong. My Debian system sources.list file as follow
and I don't seen linux image "3.16.36-1+deb8u2"
Thanks for all help,
Regards,
~ Ozgur
$ sudo cat /etc/apt/sources.list
deb http://security.debian.org/ jessie/updates main
n.org/debian/ jessie-updates/main amd64 Packages
Regards,
Ozgur
2016-11-07 20:18 GMT+03:00 Mike Oliver :
> Can we confirm whether or not the kernel is already installed? Is the
> newest version in the kernel in /boot? It's unclear from what's been said
> if the system has
Hello,
your named.conf add
logging {
category lame-servers {null; };
};
like is but.
regards..
,''`. Ozgur Karatas
: :' : [EMAIL PROTECTED]
`. `' http://www.ozgurkaratas.com
`-Powered By Debian GNU\Linux
Adrian von Bidder <[EMAIL PROTECTED]> demiş ki:
5 matches
Mail list logo