VisibleThread Help Center

    Security Announcement - Dirty C0W vulnerability CVE-2016-5195 (November 2016)

    Follow

    A Linux kernel vulnerability allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

    For more information on the vulnerability see http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html

    VisibleThread Docs & ClarityGrader Cloud Servers

    We patched all VisibleThread cloud servers as soon as a patch was available.

    VisibleThread On-premise VMs

    Note: Your VisibleThread on-premise installation is self-contained and running behind your corporate firewall, so there is very little actual risk of being impacted by this issue

    VisibleThread on-premise customers running the Ubuntu 12.04 LTS operating system can patch their systems following the steps below:

    1. ensure the VM can access the web so it can update to the latest kernel from the Ubuntu update site

    2. run the following command from the VM shell

    sudo apt-get update && sudo apt-get install linux-generic-lts-trusty

    This should install the latest Kernel (v 3.13). To confirm, run the following command:

    uname -r

    And you should see this output 3.13.0-101-generic

     

     

     

    Was this article helpful?
    0 out of 0 found this helpful

    Comments