Follow

Security Announcement - Dirty C0W vulnerability CVE-2016-5195 (November 2016)

A Linux kernel vulnerability allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

For more information on the vulnerability see http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html

VisibleThread Docs & ClarityGrader Cloud Servers

We patched all VisibleThread cloud servers as soon as a patch was available.

VisibleThread On-premise VMs

Note: Your VisibleThread on-premise installation is self-contained and running behind your corporate firewall, so there is very little actual risk of being impacted by this issue

VisibleThread on-premise customers running the Ubuntu 12.04 LTS operating system can patch their systems following the steps below:

1. ensure the VM can access the web so it can update to the latest kernel from the Ubuntu update site

2. run the following command from the VM shell

sudo apt-get update && sudo apt-get install linux-generic-lts-trusty

This should install the latest Kernel (v 3.13). To confirm, run the following command:

uname -r

And you should see this output 3.13.0-101-generic

 

 

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

0 Comments

Article is closed for comments.