Sponsored Content
The Lounge What is on Your Mind? Anybody want to talk about Dirty Cow? Post 302984395 by hicksd8 on Tuesday 25th of October 2016 11:57:18 AM
Old 10-25-2016
Here's a news clip from the UK. (BBC Copyright acknowledged)

Users of the Linux operating system are being urged to update it to remove a "serious" bug that hackers could use to hijack systems.
Known as the Dirty Cow bug, the vulnerability has been present in many versions of Linux for almost a decade.
The warnings come as malicious hackers start exploiting it to take over vulnerable computers.
The vulnerability gets its name from the Linux sub-system, called Copy-On-Write or COW, in which it appears.
Updated versions of Linux that no longer suffer the bug are now being widely distributed. Millions of computers, including a majority of web servers, run Linux or one of its variants.


"The nature of the vulnerability lends itself to extremely reliable exploitation," Dan Rosenberg, a security researcher at Azimuth Security, told tech news site Ars Technica. He added that it was the "most serious" bug of its type ever found in Linux.
The vulnerability allows attackers to steadily increase the amount of control they can exert over a target system.
Security expert Graham Cluley said the bug was of a type that did not normally prompt action because they were less likely to be exploited. However, he said, Dirty Cow should be taken seriously because there was some evidence that it was being actively abused.
Attack code that capitalised on the weakly protected sub-system was captured by developer Phil Oester as it was used in an attempt to take over a server he runs.
Mr Oester told the V3 tech news site that the vulnerability was easy to use and was "almost certain" to be more widely used by cyberthieves.
 

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Quick-and-dirty g++ compilation

I am creating a small bash file that will take one argument and compile it: #!/bin/bash OUT=${$1%.cpp} # C++ source files always end in .cpp g++ -Wall $1 -o $OUT chmod 777 $OUT The error message says 'bad substitution', namely where OUT is defined. How to fix this? (1 Reply)
Discussion started by: figaro
1 Replies

2. AIX

Can't mount showing 0506-342 The superblock on /dev/fslv00 is dirty

Dear All Last day in Aix 5.2 server by executing # df –g I found following: Filesystem GB blocks Free %Used Iused %Iused Mounted on . . /dev/fslv00 58.00 136.70 -135% 212103 1% /sprod After shutting down by following command # shutdown –h And when... (1 Reply)
Discussion started by: xa52000
1 Replies

3. UNIX for Advanced & Expert Users

Finding volumes with mirrored DRL(Dirty Region Log)

hi, How do I find VxVM volumes which have a mirrored DRL. thanks in advance Prasi (2 Replies)
Discussion started by: prasi_in
2 Replies

4. Shell Programming and Scripting

noob question - is awk the tool to clean dirty text files?

Hi, nevermind. I think I've found the answer. It appears I was looking for index, match, sub, and gsub. I want to write a shell script that will clean the html out of a bunch of files and format the data for import into excel. Awk seems like a powerful tool, but it seems oriented to... (1 Reply)
Discussion started by: yogert909
1 Replies

5. Shell Programming and Scripting

Need a quick and dirty solution

I have a list of multiple versions of software. The list is formated as follows: NAME VERSION I simply need to pull out the highest version of each software, for example: Original File a v1.0 a v1.1 a v1.2 b v2.1 b v2.2 b v2.21 b v3.0 Output a v1.2 b v3.0 (13 Replies)
Discussion started by: Finja
13 Replies

6. UNIX for Advanced & Expert Users

Superblock marked dirty

Good morning! I met a problem on a FS with AIX 5.3 It's not possible to mount the FS because of a dirty superblock. I tried few things without success. I need your help to solve my problem guys. Do you have any idea please? Thanks a lot drp01,/home/root # mount /GSPRES/data Replaying... (9 Replies)
Discussion started by: Castelior
9 Replies

7. Linux

Broadcom under Fedora 18 (Spherical Cow)

So I'm having a problem getting a Broadcom BCM4312 wireless controller to work under the broadcom-wl module $uname Linux 3.8.11-200.fc18.x86_64 #1 SMP Wed May 1 19:44:27 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux lspci -v 05:00.0 Network controller: Broadcom Corporation BCM4312 802.11b/g... (2 Replies)
Discussion started by: Skrynesaver
2 Replies
bug-buddy(1)						      General Commands Manual						      bug-buddy(1)

NAME
bug-buddy - graphical bug reporting tool SYNOPSIS
bug-buddy [options] DESCRIPTION
bug-buddy is a graphical bug reporting tool for GNOME. The goal of Bug Buddy is to make reporting bugs very simple and easy for the user, while making the reports themselves more useful and informative for the developer. OPTIONS
--name=NAME Name of contact --email=EMAIL Email address of contact --package=PACKAGE Package containing the program --package-ver=VERSION Version of the package --appname=FILE Filename of the crashed program --pid=PID PID of the crashed program --core=FILE Core file from program --include=FILE Text file to include in the report LICENSE
Copyright (C) 1999-2002 Jacob Berkman Copyright 2000, 2001, 2002 Ximian, Inc. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MER- CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307, USA. AUTHOR
Jacob Berkman <jacob@bug-buddy.org> This manual page was written by David LaBissoniere, <labisso@debian.org> for the Debian GNU/Linux system (but may be used by others). February 14, 2001 bug-buddy(1)
All times are GMT -4. The time now is 01:00 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy