SCIENTIFIC-LINUX-USERS Archives

October 2016

SCIENTIFIC-LINUX-USERS@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Sender:
Mailing list for Scientific Linux users worldwide <[log in to unmask]>
Date:
Sun, 23 Oct 2016 08:38:21 -0500
Reply-To:
"~Stack~" <[log in to unmask]>
Message-ID:
Subject:
From:
"~Stack~" <[log in to unmask]>
Content-Type:
multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="1g9KGH7dbst2UDl3OSAQh6vKFBOqC2bLA"
In-Reply-To:
MIME-Version:
1.0
Comments:
Parts/Attachments:
text/plain (1184 bytes) , signature.asc (834 bytes)
On 10/22/2016 02:52 PM, Denice wrote:
> As well, the importance of this vulnerability hinges on user access;
> in SANS newsbites yesterday, one of the editors made this remark
> about this kernel vulnerablity (branded by the person(s) who raised
> the issue: "Dirty Cow"):
> 
>    This is a privilege escalation vulnerability that was introduced in
> Linux
>    about 11 years ago. An exploit has been used in some attacks to take
>    advantage of this vulnerability, but the exploit has not been made
>    public yet. Systems based on RedHat ES 5 and 6, which are vulnerable,
>    appear to be not susceptible to the exploit as this particular exploit
>    requires write access to /proc/self/mem. Given that this exploit
>    requires user access, and the actual exploit is only in limited
>    distribution (but this may change soon), "branding" this exploit is
>    hyping a minor and common vulnerability and only serves to distract
>    administrators from more important tasks. Deal with patches for this
>    vulnerability like you would deal with any other kernel patch.
> 
> https://www.sans.org/newsletters/newsbites/xviii/84

Well said. Thank you for that link.

> 
> cheers, etc.

Cheers!




ATOM RSS1 RSS2