Displaying 2 results from an estimated 2 matches for "dirtyc0w".
2016 Oct 24
3
CVE-2016-5195 DirtyCOW: Critical Linux Kernel Flaw
On Sat, 22 Oct 2016, Valeri Galtsev wrote:
> On Sat, October 22, 2016 7:49 pm, Valeri Galtsev wrote:
>> Dear All,
>>
>> I guess, we all have to urgently apply workaround, following, say, this:
>>
>> https://gryzli.info/2016/10/21/protect-cve-2016-5195-dirtycow-centos-7rhel7cpanelcloudlinux/
>>
>> At least those of us who still have important multi user
2016 Oct 25
2
CVE-2016-5195 “DirtyCOW”: Critical Linux Kernel Flaw
...s to
> Centos 7, or if it also works on Centos 6?
>
> Cheers, Christian
>
>
I have not been able to get this script to work on CentOS 6.8
I've installed kernel-debug, kernel-devel, kernel-debug-devel,
kernel-debug-debuginfo, kernel-debuginfo-common and I still get:
stap -g -p 4 dirtyc0w.stp
semantic error: while resolving probe point: identifier 'syscall' at
dirtyc0w.stp:5:7
source: probe syscall.ptrace {
^
semantic error: no match
Pass 2: analysis failed. [man error::pass2]
Anybody have any success with this?
--
Matt Phelps
System Admi...