[tor-relays] Linux kernel vulnerability

Petrusko petrusko at riseup.net
Sat Oct 22 23:26:27 UTC 2016


https://security-tracker.debian.org/tracker/CVE-2016-5195

Remember,
to know your current debian linux kernel : uname -a

If your kernel is not up to date :
apt-get update && apt-get dist-upgrade && reboot


I :
> Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel
>
> http://dirtycow.ninja/

-- 
Petrusko
PubKey EBE23AE5
C0BF 2184 4A77 4A18 90E9 F72C B3CA E665 EBE2 3AE5


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20161023/010dd6b4/attachment.sig>


More information about the tor-relays mailing list