10-25-2016
Here's a news clip from the UK. (BBC Copyright acknowledged)
Users of the Linux operating system are being urged to update it to remove a "serious" bug that hackers could use to hijack systems.
Known as the Dirty Cow bug, the vulnerability has been present in many versions of Linux for almost a decade.
The warnings come as malicious hackers start exploiting it to take over vulnerable computers.
The vulnerability gets its name from the Linux sub-system, called Copy-On-Write or COW, in which it appears.
Updated versions of Linux that no longer suffer the bug are now being widely distributed. Millions of computers, including a majority of web servers, run Linux or one of its variants.
"The nature of the vulnerability lends itself to extremely reliable exploitation," Dan Rosenberg, a security researcher at Azimuth Security, told tech news site Ars Technica. He added that it was the "most serious" bug of its type ever found in Linux.
The vulnerability allows attackers to steadily increase the amount of control they can exert over a target system.
Security expert Graham Cluley said the bug was of a type that did not normally prompt action because they were less likely to be exploited. However, he said, Dirty Cow should be taken seriously because there was some evidence that it was being actively abused.
Attack code that capitalised on the weakly protected sub-system was captured by developer Phil Oester as it was used in an attempt to take over a server he runs.
Mr Oester told the V3 tech news site that the vulnerability was easy to use and was "almost certain" to be more widely used by cyberthieves.
7 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am creating a small bash file that will take one argument and compile it:
#!/bin/bash
OUT=${$1%.cpp} # C++ source files always end in .cpp
g++ -Wall $1 -o $OUT
chmod 777 $OUT The error message says 'bad substitution', namely where OUT is defined. How to fix this? (1 Reply)
Discussion started by: figaro
1 Replies
2. AIX
Dear All
Last day in Aix 5.2 server by executing
# df –g
I found following:
Filesystem GB blocks Free %Used Iused %Iused Mounted on
.
.
/dev/fslv00 58.00 136.70 -135% 212103 1% /sprod
After shutting down by following command
# shutdown –h
And when... (1 Reply)
Discussion started by: xa52000
1 Replies
3. UNIX for Advanced & Expert Users
hi,
How do I find VxVM volumes which have a mirrored DRL.
thanks in advance
Prasi (2 Replies)
Discussion started by: prasi_in
2 Replies
4. Shell Programming and Scripting
Hi,
nevermind. I think I've found the answer. It appears I was looking for index, match, sub, and gsub.
I want to write a shell script that will clean the html out of a bunch of files and format the data for import into excel.
Awk seems like a powerful tool, but it seems oriented to... (1 Reply)
Discussion started by: yogert909
1 Replies
5. Shell Programming and Scripting
I have a list of multiple versions of software. The list is formated as follows:
NAME VERSION
I simply need to pull out the highest version of each software, for example:
Original File
a v1.0
a v1.1
a v1.2
b v2.1
b v2.2
b v2.21
b v3.0
Output
a v1.2
b v3.0 (13 Replies)
Discussion started by: Finja
13 Replies
6. UNIX for Advanced & Expert Users
Good morning!
I met a problem on a FS with AIX 5.3
It's not possible to mount the FS because of a dirty superblock.
I tried few things without success. I need your help to solve my problem guys. Do you have any idea please?
Thanks a lot
drp01,/home/root # mount /GSPRES/data
Replaying... (9 Replies)
Discussion started by: Castelior
9 Replies
7. Linux
So I'm having a problem getting a Broadcom BCM4312 wireless controller to work under the broadcom-wl module
$uname
Linux 3.8.11-200.fc18.x86_64 #1 SMP Wed May 1 19:44:27 UTC 2013 x86_64 x86_64 x86_64 GNU/Linux
lspci -v
05:00.0 Network controller: Broadcom Corporation BCM4312 802.11b/g... (2 Replies)
Discussion started by: Skrynesaver
2 Replies
LEARN ABOUT REDHAT
bug-buddy
bug-buddy(1) General Commands Manual bug-buddy(1)
NAME
bug-buddy - graphical bug reporting tool
SYNOPSIS
bug-buddy [options]
DESCRIPTION
bug-buddy is a graphical bug reporting tool for GNOME. The goal of Bug Buddy is to make reporting bugs very simple and easy for the user,
while making the reports themselves more useful and informative for the developer.
OPTIONS
--name=NAME
Name of contact
--email=EMAIL
Email address of contact
--package=PACKAGE
Package containing the program
--package-ver=VERSION
Version of the package
--appname=FILE
Filename of the crashed program
--pid=PID
PID of the crashed program
--core=FILE
Core file from program
--include=FILE
Text file to include in the report
LICENSE
Copyright (C) 1999-2002 Jacob Berkman Copyright 2000, 2001, 2002 Ximian, Inc.
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MER-
CHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation,
Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307, USA.
AUTHOR
Jacob Berkman <jacob@bug-buddy.org>
This manual page was written by David LaBissoniere, <labisso@debian.org> for the Debian GNU/Linux system (but may be used by others).
February 14, 2001 bug-buddy(1)