[tor-relays] Linux kernel vulnerability
Petrusko
petrusko at riseup.net
Sat Oct 22 23:26:27 UTC 2016
https://security-tracker.debian.org/tracker/CVE-2016-5195
Remember,
to know your current debian linux kernel : uname -a
If your kernel is not up to date :
apt-get update && apt-get dist-upgrade && reboot
I :
> Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel
>
> http://dirtycow.ninja/
--
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161023/010dd6b4/attachment.sig>
More information about the tor-relays
mailing list