[sf-lug] Holy COW Linux Bug, Batman!

aaronco36 aaronco36 at linuxwaves.com
Fri Oct 21 11:02:50 PDT 2016


The Dirty Cow Linux bug: A silly name for a serious problem[1]

With attacks in the wild reported, you need to fix this Linux bug as soon as possible.


Quoting article[1] author SJVN:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Dirty Cow[2] is a silly name, but it's a serious Linux kernel problem. According to the Red Hat[3] bug report, "a race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system."
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

>From [2], if you're using Red Hat, Debian, Ubuntu and/or SUSE, you can find out further information on your specific distro's handling of the Dirty COW Linux bug CVE-2016-5195 at [4],[5],[6] and/or [7], respectively.
-A


References:
================

[1]http://www.zdnet.com/article/the-dirty-cow-linux-security-bug-moos/ 
[2]https://dirtycow.ninja/ 
[3]https://www.redhat.com/en 
[4]https://access.redhat.com/security/cve/cve-2016-5195 
[5]https://security-tracker.debian.org/tracker/CVE-2016-5195 
[6]http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html 
[7]https://www.suse.com/security/cve/CVE-2016-5195.html 

================



_____________________________________________________________
Get your FREE, LinuxWaves.com Email Now! --> http://www.LinuxWaves.com 
Join Linux Discussions! --> http://Community.LinuxWaves.com




More information about the sf-lug mailing list