CVE-2016-5195 linux kernel local privilege escalation (Dirty COW)
Bug #1636528 reported by
Anton Chevychalov
This bug affects 3 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Mirantis OpenStack |
Fix Released
|
High
|
MOS Linux | ||
5.1.x |
Fix Committed
|
High
|
Anton Chevychalov | ||
6.0.x |
Fix Committed
|
High
|
MOS Maintenance | ||
6.1.x |
Fix Committed
|
High
|
MOS Maintenance | ||
7.0.x |
Fix Released
|
High
|
Anton Chevychalov | ||
8.0.x |
Fix Released
|
High
|
Anton Chevychalov | ||
9.x |
Fix Released
|
High
|
MOS Linux |
Bug Description
There is local privilege escalation in all version of Linux kernel from 2.6.22
CVE-2016-5195:
http://
Uptream patch:
https:/
RedHat:
https:/
https:/
Ubuntu:
http://
CVE References
tags: | added: feature-security |
information type: | Private Security → Public Security |
summary: |
- CVE-2016-5195 linux kernel local privilege escalation + CVE-2016-5195 linux kernel local privilege escalation (Dirty COW) |
tags: | added: customer-found sla1 |
tags: | added: centos |
To post a comment you must log in.
GitHub /github. com/dirtycow/ dirtycow. github. io/wiki/ VulnerabilityDe tails
https:/
Ubuntu
4.8.0-26.28 for Ubuntu 16.10
4.4.0-45.66 for Ubuntu 16.04 LTS
3.13.0-100.147 for Ubuntu 14.04 LTS
3.2.0-113.155 for Ubuntu 12.04 LTS
Debian
3.16.36-1+deb8u2 for Debian 8
3.2.82-1 for Debian 7
4.7.8-1 for Debian unstable
Arch
4.4.26-1 for ArchLinux (linux-lts package)
4.8.3 for ArchLinux (linux package)
RHEL/Centos
Instructions for patching RHEL/Centos 6.x can be found here
Gentoo
Bug: https:/ /bugs.gentoo. org/show_ bug.cgi? id=597624
sys-kernel/ gentoo- sources- 4.1.35 gentoo- sources- 4.8.x - TBD gentoo- sources- 3.x.x - TBD
sys-kernel/
sys-kernel/
Others
If you must stay in kernel 3.19 family, version 3.19.0-73.81 is a patched version and available for Ubuntu 14.04 from official repos. (update via dist-upgrade)