Talk:Dirty COW
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||
|
Patched OSs
[edit]As of now, the article only mentions Debian GNU/Linux to offer a patch; I assume this is vastly incorrect -- at least openSUSE/SUSE GNU/Linux have a patch as well. Most others might also. Hence, this should be either altered or abandoned completely. The only OS that might stand out -- outside the scope of my knowledge -- is Android, because of its unique "updating" mechanism. Derfopps (talk) 08:09, 24 October 2016 (UTC) derfopps
patched versions??
[edit]The bug has been patched in Linux kernel versions 4.8.3, 4.7.9, 4.4.26 and newer.
But: to be save, "use version 3.xxx"... (below)
- which one is correct? — Preceding unsigned comment added by 194.166.187.227 (talk) 19:00, 14 May 2017 (UTC)
Discoverer
[edit]The two first sources indicate that Phil Oester extracted the exploit on a compromised machine and analyzed the sample. Therefore, the bug had been exploited before. Thus, he never claimed paternity of the bug discovery. This should be said in the Wikipedia article. The author is still unknown. 201.141.109.196 (talk) 17:49, 26 November 2024 (UTC)
- C-Class Computing articles
- Low-importance Computing articles
- C-Class software articles
- Low-importance software articles
- C-Class software articles of Low-importance
- All Software articles
- C-Class Computer Security articles
- High-importance Computer Security articles
- C-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- C-Class Linux articles
- High-importance Linux articles
- WikiProject Linux articles