Skip to content
Blog

Dirty Cow - Critical Security Vulnerability in the Linux Kernel

28 October 2016 | INGATE Team

On October 19, 2016, a critical security vulnerability in the Linux kernel was publicly disclosed: Dirty COW (CVE-2016-5195). The vulnerability had existed in the kernel for approximately 9 years and allows local privilege escalation.

What is Dirty COW?

Dirty COW (Copy-On-Write) is a race condition in the Linux kernel's memory management. The vulnerability allows a local attacker to gain write access to memory areas that are supposed to be read-only. This enables an unprivileged user to obtain root privileges.

Affected Systems

Nearly all Linux distributions with kernel versions from 2.6.22 (2007) up to the patch are affected:

  • CentOS / RHEL 5, 6 and 7
  • Debian 7 and 8
  • Ubuntu 12.04, 14.04 and 16.04
  • SUSE Linux Enterprise Server 11 and 12

Actions Taken by INGATE

Managed Server

All managed service customers were patched within 24 hours of the vulnerability becoming known. Kernel updates were applied during emergency maintenance windows. A system reboot was required.

Colocation and Bare Metal

Customers managing their own servers were notified by email about the security vulnerability and available patches. We strongly recommend applying the kernel updates as soon as possible.

Recommended Action

Check whether your Linux kernel is up to date. Perform a system update immediately:

  • CentOS/RHEL: yum update kernel
  • Debian/Ubuntu: apt-get update && apt-get upgrade

A reboot is required after the update. If you have any questions, our technical team is available at info@ingate.de.

Technology Partners & Memberships

Dell PartnerDirect
Equinix
EMC Home of Data
Juniper Networks
LiveConfig
Microsoft Cloud Solution Provider
Microsoft SPLA Partner
RIPE NCC Member