-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2016-0139 Title: Linux Kernel vulnerability "Dirty COW" Version history: 21.10.2016 Initial publication Summary ======= It has been reported a serious vulnerability that has been present for nine years in a section of the Linux kernel, which is most probably part of all the distributions of this OS. This vulnerability has been classified as a privilege escalation vulnerability, but can be used in combination with any exploit, which gets execution rights in the user space, in order to turn them into admin rights. CVE number: CVE-2016-5195 Technical details ================= The vulnerability, a variety known as a race condition, was found in the way Linux memory handles a duplication technique called copy on write (COW). Untrusted users can exploit it to gain highly privileged write-access rights to memory mappings that would normally be read-only [1]. Vulnerable systems ================== All Linux releases since 2.6.22 and was fixed on Oct 18, 2016 [2]. What can you do? ================ Due to the fact that an exploit proof of concept has been already published, it is highly recommended to patch all the Linux system as soon as possible. Review the available information for your distribution. Below there are some links to the pages for some of the more widely used: Red Hat [3], Debian [4] and Ubuntu [5]. More information ================ [1] https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails [2] http://dirtycow.ninja/ [3] https://access.redhat.com/security/cve/cve-2016-5195 [4] https://security-tracker.debian.org/tracker/CVE-2016-5195 [5] http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html Best regards, CERT-EU Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJYChT+AAoJEPpzpNLI8SVovYEP/A8BiHQ56IIihN3Im7aJo1GW O6gyNqNXpD/vpUCo0+dXh/AVNziBHY36e43s/QoYfqLe59YAGlh8oXDswDwl+iYn PYB7AyK6I3FmsRMRNM0cwGwb52MjbtV7Ys+mjHCz/tWXbsIxzdP+tYhFYdI1V2nZ J6ZHJvMfy5fQibLuDqDyQ0pNyDczh+oqt6aqFnvOKovOkNJvI3TICgkz/ztibk55 Tih2Rm4jNSwHZIYh4v/gDnOfw7pUdZHtxdW/y3uHcmHDK8VEEm7ved3AuB0xRY9v Du/n7wDGvu/UrirW++Vu1A5rWuJtNEntvktIC8WhBxIRw6UKeEECNEyIaHVy3fhD ce9OIRxBELe9+XDbfQ2pNdPPaF49Jq8Uv5BUvwcVr+rMRxfaMEIdXouQkOlV3eLM S7G57wzfvxkGSCjL0j1eYfsNQmqprRq4iMk4IG3dmP9z8Y+xJI13W/LvhVjbtRzR m+ilFPuRKcGsfNEYhkoyPzT7kS51ViqUuNqtIePbWmd/VG1G5oG9kv4I0cQIyDo4 fmuH3H+YfCwTtGDE40oL4VNI32NmfK1pj2NJtRhfvWxrhWWPkJ+jPkfU0wap30VD n0JZkEU+G9mzxZBMIQkuX4sQwqIhqxYneAMpi4PVZoTeZVTBFVrtQ4sWofcKhgPN UsnZ49XFBLMIT1QWG5wL =0RfK -----END PGP SIGNATURE-----