We are in the process of migrating this forum. A new space will be available soon. We are sorry for the inconvenience.

Linux Dirty Cow Vulnerability


Felix@OVH
03-11-2016, 11:11
Quote Originally Posted by wii89
Are the OVH kernels that are running grsecurity protected by the Linux Dirty Cow vulnerability?
The GRSec patch does NOT reliably prevent exploitation of the "dirty COW" flaw.
Please check http://travaux.ovh.net/?do=details&id=20890 for all details.

24x7servermanag
01-11-2016, 12:28
The bug is already patched on some of the major versions of Linux, including Red Hat, Debian and Ubuntu.

To find out if your server is affected, check your kernel version.

uname -rv

You'll see output like this:

Output
4.4.0-42-generic #62-Ubuntu SMP Fri Oct 7 23:11:45 UTC 2016


If your version is earlier than the following, you are affected:

4.8.0-26.28 for Ubuntu 16.10
4.4.0-45.66 for Ubuntu 16.04 LTS
3.13.0-100.147 for Ubuntu 14.04 LTS
3.2.0-113.155 for Ubuntu 12.04 LTS
3.16.36-1+deb8u2 for Debian 8
3.2.82-1 for Debian 7
4.7.8-1 for Debian unstable

wii89
01-11-2016, 11:03
Quote Originally Posted by ServerSolutions
First of all try to determine your system kernel status with the following bash script.

Code:
wget https://access.redhat.com/sites/default/files/rh-cve-2016-5195_2.sh

bash rh-cve-2016-5195_2.sh
Hi,

Whats the script to check Debian OS

ServerSolutions
28-10-2016, 13:49
First of all try to determine your system kernel status with the following bash script.

Code:
wget https://access.redhat.com/sites/default/files/rh-cve-2016-5195_2.sh

bash rh-cve-2016-5195_2.sh

wii89
27-10-2016, 12:32
Hi,

Are the OVH kernels that are running grsecurity protected by the Linux Dirty Cow vulnerability?