rpdom wrote:This exploit only affects systems where the attacker can gain access (as any user) to run code directly. It isn't one where there is a "backdoor" method of gaining access.
This is a pretty dumb statement.
Dirty Cow allows
any local user to gain root privileges. Bad enough.
I don't know what your understanding of security is. If somebody compromises my web server (let's say, a
remote code execution backdoor or bug), yes, this person
could (under normal circumstances) probably delete some/most of my website, look at all my www files, but
would not be able to reboot or load a kernel driver or whatever root can do and others can't.
He couldn't even steal my private keys!
If you have secured your Pi properly (at the very least change default the "pi" password), you're very unlikely to be affected.
Wow, this is 2016 and the only security measure we need is change the default password. And then
we call this "properly securing your pi".
You're probably using a
properly secured Windows XP and Ubuntu in a VM and are part of the big
DDoS attacks we could see in the past few months without even knowing...
This bug is
already exploited in the wild! This is how they spotted it.
It took my raspberry pi offline and I wait for a kernel update or maybe I'll go through the pain and build it myself.
I hope a fix comes soon, it's literally two lines. Is this so hard to do? Or is this too much to ask for?