[News] Linux Exploit: Dirty Cow

For larger environments like that you'd probably use something like Spacewalk / Ansible / Chef / Puppet

@wendell may be using something for his servers?

2 Likes

Are these the fixed versions?

Its not limited to those releases.

Looks like they have pushed it for all currently supported kernels. But you should check the security advisory / security tracking for your distro.

How fast is Ubuntu at pushing these sorts of critical updates? I'm probably going to update manually, but I might give it a day or two

I think ubuntu has pushed updates to some/most of their supported releases.
The applicable security advisories for this for Ubuntu are here http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html

It figures... 3.19.0-32 was the only kernel I found on Mint 17.3 that would give me full throughput on my wireless. Rolled back to 3.13.0-100 since it seems to be the most stable and my wireless is still all over the place with an average loss of around 20 Mbps on d/l. Might have to try a clean upgrade to LM 18.

I knew things were going too well. :-)

Yeah or maybe try something else then mint?
Nice thing about live boot mediums, is you could test that stuff before installing.
For the most part.

To answer a previous question Mint is already patched...It is patched as fast as in Ubuntu as it takes the Ubuntu LTS kernels directly and canonical was pretty fast....But the security patch is not forced with the recommended setting although shown on the update manager unfortunately.

The 4.4.0-45.66 kernel fixes the bug for Mint 18. Other versions have their similar respectives from the ubuntu list:

http://news.softpedia.com/news/canonical-patches-ancient-dirty-cow-kernel-bug-in-all-supported-ubuntu-oses-509507.shtml

1 Like

BTW anyone works at a place with Red Hat services? Do you know if Red Hat has already provided the security patch?

Check the red hat sec site. As of yesterday I don't think k it was pushed yet.

Patch is not pushed yet but there is a mitigation available

https://access.redhat.com/security/cve/CVE-2016-5195

It's all in the link,Have a nice day you'all

http://www.cyberciti.biz/faq/dirtycow-linux-cve-2016-5195-kernel-local-privilege-escalation-vulnerability-fix/

I just hope this won't get blow up on tech sites. Like former big bugs, but i hope this is one of the last.

@Baz Did you test it on Android?

@turin231 and maybe @wendell a patch has been released for RHEL 7 https://access.redhat.com/errata/RHSA-2016:2098?sc_cid=701600000006NHXAA2

1 Like

no fix on redhat and variants yet, but
https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13
the mitigation works fine (creating the stp file)

2 Likes

wendell replied to a thread I made, i can now die a happy man.

Only just now tried to play with it, this is as far as I got in 5 minutes - I have no idea how android works lmao.

You have to import some libraries that are different on android (quick observation on you're attempt). It might not be Android related unless somebody discovers different. Hope i find some spare time to check it out in peace this week.

Also i found this video for the more non experianced users with a Ubuntu based distro,
about how to fix it if you need to role back..

oh no, it works on android just peachy. The internet of things zombie ddos monster just got about 852,000 time stronger.

See if the NSA had its crap together their people would have already released a worm that live patches this thing like the STP work around redhat is using to stop ANYONE from abusing this type of exploit. THAT type of thing is what they're supposed to be doing with taxpayer dollars. Not spying on grandma.

They can spy on the terrorists all they want.

I just don't like to see anyone take the approach of "...shoot everyone and let god sort it out".

5 Likes