KernelCare Blog - Dirty Cow vulnerability: the fix is here!
KernelCare Blog

Dirty Cow vulnerability: the fix is here!

Dirty Cow vulnerability: the fix is here!

A vulnerability has been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. KernelCare team is working on fixing of the so-called Dirty Cow issue.

CVE-2016-5195: a race condition in the memory management code can be used for local privilege escalation.

Dirty Cow patch for KernelCare ETA:

  • Debian: Released (6:35am PT, Oct 21, 2016)
  • Ubuntu: Released (6:35am PT, Oct 21, 2016)
  • CentOS 7: Released (9:50am PT, Oct 21, 2016)
  • RHEL 7: Released (9:50am PT, Oct 21, 2016)
  • CloudLinux OS 7: Released (9:50am PT, Oct 21, 2016)
  • CentOS 6.x: Released (12:05pm PT, Oct 21, 2016)
  • RedHat 6.x: Released (12:05pm PT, Oct 21, 2016)
  • CloudLinuxOS 6.x: Released (12:05 PT, Oct 21, 2016)
  • RHEL/CentOS/CloudLinux OS 5.x: Released (9:15am PT, Oct 22, 2016)
  • Virtuozzo/OpenVZ: Released (12:05pm PT, Oct 21, 2016)
  • Proxmox VE 3.10: Released (9:50am PT, Oct 21, 2016)
  • Proxmox VE 2.6.32: Released (12:05pm PT, Oct 21, 2016)
  • Proxmox VE 4.x: Released (9:15am PT, Oct 22, 2016)

Please follow the updates. This blog-post is being updated as we have more info and new patches are out.

To learn more about KernelCare, and how to purchase it or try it, visit this page

Beta: HardenedPHP updated
Dirty Cow issue: the fix is coming
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 13 November 2019

Captcha Image