Dirty COW vulnerability

A vulnerability was found in the Linux kernel which has been patched since. The vulnerability made possible for unauthorised users to get root privileges by exploiting a race condition in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings, hence the Dirty COW codename.

To learn more about Dirty COW (a.k.a. CVE-2016-5195), check out the dedicated https://dirtycow.ninja/ project site for the vulnerability and watch the video below:

What we've done

We've already updated and rebooted our systems with a patched kernel version. Our host machines and your servers in Linux containers are safe.

What you need to do

If you don't have Linux virtual machines(VMs), you are perfectly safe and don't need to do anything.

If you have Linux VMs, we highly recommend you to update and reboot them. If you don't want to reboot unless it's absolutely necessary, check your kernel version first:

uname -rv  

If your version is earlier than the following, you are affected and really need to update and reboot your systems:

Ubuntu
4.8.0-26.28 for Ubuntu 16.10
4.4.0-45.66 for Ubuntu 16.04 LTS
3.13.0-100.147 for Ubuntu 14.04 LTS
3.2.0-113.155 for Ubuntu 12.04 LTS

Debian
3.16.36-1+deb8u2 for Debian 8
3.2.82-1 for Debian 7
4.7.8-1 for Debian unstable

More information

Instructions for patching RHEL/Centos 6.x can be found here. Detailed vulnerability status pages on the distributor sites:
Red Hat, Debian, Ubuntu and SUSE.


As always, if you have any question, please leave a comment or talk to our 24x7 support team.

New to ElasticHosts?

Report an issue