<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" 
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:meneame="http://meneame.net/faq-es.php"
 >
<channel>
	<title>Menéame: comentarios [2789524]</title>
	<link>http://www.meneame.net</link>
	<image><title>www.meneame.net</title><link>http://www.meneame.net</link><url>http://cdn.mnmstatic.net/m/tecnología/img/mnm/eli-rss.png</url></image>
	<description>Sitio colaborativo de publicación y comunicación entre blogs</description>
	<pubDate>Wed, 21 Jun 2017 13:29:20 +0000</pubDate>
	<generator>http://blog.meneame.net/</generator>
	<language>es</language>
	<item>
		<meneame:comment_id>22019232</meneame:comment_id>
		<meneame:link_id>2789524</meneame:link_id>
		<meneame:order>4</meneame:order>
		<meneame:user>Marx</meneame:user>
		<meneame:votes>0</meneame:votes>
		<meneame:karma>9</meneame:karma>
		<meneame:url>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root</meneame:url>
		<title>#4 Stack Clash, una nueva vulnerabilidad grave en sistemas Linux y Unix que permite conseguir permisos de root</title>
		<link>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c04#c-4</link>
		<pubDate>Wed, 21 Jun 2017 13:29:20 +0000</pubDate>
		<dc:creator>Marx</dc:creator>
		<guid>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c04#c-4</guid>
		<description><![CDATA[<p><a class="tooltip c:2789524-2" href="https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c02#c-2" rel="nofollow">#2</a> Se pueden dar circunstancias en que sea posible un ataque remoto. <br />
<br />
Aquí explicado: <a href="https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" title="www.qualys.com/2017/06/19/stack-clash/stack-clash.txt" rel="nofollow">www.qualys.com/2017/06/19/stack-clash/stack-clash.txt</a></p><p>&#187;&nbsp;autor: <strong>Marx</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>22018115</meneame:comment_id>
		<meneame:link_id>2789524</meneame:link_id>
		<meneame:order>3</meneame:order>
		<meneame:user>zoezoe</meneame:user>
		<meneame:votes>3</meneame:votes>
		<meneame:karma>54</meneame:karma>
		<meneame:url>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root</meneame:url>
		<title>#3 Stack Clash, una nueva vulnerabilidad grave en sistemas Linux y Unix que permite conseguir permisos de root</title>
		<link>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c03#c-3</link>
		<pubDate>Wed, 21 Jun 2017 11:36:09 +0000</pubDate>
		<dc:creator>zoezoe</dc:creator>
		<guid>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c03#c-3</guid>
		<description><![CDATA[<p><i>How can I protect my system from the Stack Clash?<br />
<br />
The easiest and safest way to protect your system is to update it: we have been working with the affected vendors since the beginning of May, and by the time you read this, their patches and updates will be available.</i><br />
<br />
<a href="https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash" title="blog.qualys.com/securitylabs/2017/06/19/the-stack-clash" rel="nofollow">blog.qualys.com/securitylabs/2017/06/19/the-stack-clash</a><br />
<br />
<a class="tooltip c:2789524-1" href="https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c01#c-1" rel="nofollow">#1</a> <img data-src="https://cdn.mnmstatic.net/v_149/img/menemojis/36/troll.png" alt=":troll:" title=":troll:" width="18" height="18" src="https://cdn.mnmstatic.net/v_149/img/g.gif" class="emoji lazy" /></p><p>&#187;&nbsp;autor: <strong>zoezoe</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>22018099</meneame:comment_id>
		<meneame:link_id>2789524</meneame:link_id>
		<meneame:order>2</meneame:order>
		<meneame:user>GentooXativa</meneame:user>
		<meneame:votes>4</meneame:votes>
		<meneame:karma>47</meneame:karma>
		<meneame:url>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root</meneame:url>
		<title>#2 Stack Clash, una nueva vulnerabilidad grave en sistemas Linux y Unix que permite conseguir permisos de root</title>
		<link>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c02#c-2</link>
		<pubDate>Wed, 21 Jun 2017 11:34:36 +0000</pubDate>
		<dc:creator>GentooXativa</dc:creator>
		<guid>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c02#c-2</guid>
		<description><![CDATA[<p>Se necesita acceso local y modificar la linea de comando que se le pasa al bootloader, es grave pero tampoco es que afecte mucho a los servidores remotos, ademas ya está solucionado en la mayoría de distribuciones</p><p>&#187;&nbsp;autor: <strong>GentooXativa</strong></p>]]></description>
	</item>

	<item>
		<meneame:comment_id>22017946</meneame:comment_id>
		<meneame:link_id>2789524</meneame:link_id>
		<meneame:order>1</meneame:order>
		<meneame:user>Mister_Lala</meneame:user>
		<meneame:votes>1</meneame:votes>
		<meneame:karma>21</meneame:karma>
		<meneame:url>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root</meneame:url>
		<title>#1 Stack Clash, una nueva vulnerabilidad grave en sistemas Linux y Unix que permite conseguir permisos de root</title>
		<link>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c01#c-1</link>
		<pubDate>Wed, 21 Jun 2017 11:20:20 +0000</pubDate>
		<dc:creator>Mister_Lala</dc:creator>
		<guid>https://www.meneame.net/m/tecnología/stack-clash-nueva-vulnerabilidad-grave-sistemas-linux-unix-root/c01#c-1</guid>
		<description><![CDATA[<p>Los tiempos en que linux era inmune a virus y ataques (porque a nadie le importaba), han pasado.</p><p>&#187;&nbsp;autor: <strong>Mister_Lala</strong></p>]]></description>
	</item>

</channel>
</rss>
