Felix@OVH
03-11-2016, 11:11

Originally Posted by
wii89
Are the OVH kernels that are running grsecurity protected by the Linux Dirty Cow vulnerability?
The GRSec patch does NOT reliably prevent exploitation of the "dirty COW" flaw.
Please check
http://travaux.ovh.net/?do=details&id=20890 for all details.
24x7servermanag
01-11-2016, 12:28
The bug is already patched on some of the major versions of Linux, including Red Hat, Debian and Ubuntu.
To find out if your server is affected, check your kernel version.
uname -rv
You'll see output like this:
Output
4.4.0-42-generic #62-Ubuntu SMP Fri Oct 7 23:11:45 UTC 2016
If your version is earlier than the following, you are affected:
4.8.0-26.28 for Ubuntu 16.10
4.4.0-45.66 for Ubuntu 16.04 LTS
3.13.0-100.147 for Ubuntu 14.04 LTS
3.2.0-113.155 for Ubuntu 12.04 LTS
3.16.36-1+deb8u2 for Debian 8
3.2.82-1 for Debian 7
4.7.8-1 for Debian unstable

Originally Posted by
ServerSolutions
First of all try to determine your system kernel status with the following bash script.
Code:
wget https://access.redhat.com/sites/default/files/rh-cve-2016-5195_2.sh
bash rh-cve-2016-5195_2.sh
Hi,
Whats the script to check Debian OS
ServerSolutions
28-10-2016, 13:49
First of all try to determine your system kernel status with the following bash script.
Code:
wget https://access.redhat.com/sites/default/files/rh-cve-2016-5195_2.sh
bash rh-cve-2016-5195_2.sh
Hi,
Are the OVH kernels that are running grsecurity protected by the Linux Dirty Cow vulnerability?