Announcement

Collapse
No announcement yet.

Dirty Cow fix?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Dirty Cow fix?

    Kernel exploit

  • #2
    Hello,

    Is https://bugzilla.redhat.com/show_bug.cgi?id=1384344 patched?
    More information also available here:
    Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel.

    Comment


    • #3
      m not too bright, but the "mitigation" Ive read about states that it disables ptrace.

      I wonder if having "kernel.user_ptrace = 0" in /etc/sysctl.conf is enough to mitigate this on CL servers.

      Mike

      Comment


      • #4
        Hi,

        Yes, disabling ptrace could help here, however with our tests its a bit broken. We are working to to release patched kernels and they will be available soon.

        Comment


        • #5
          Can you tell us more about the impact?

          I am using CageFS everywhere and all users are in LVE.

          I am unable to reproduce the bug:

          bash-4.1$ cat foo
          this is not a test
          bash-4.1$ ./dirtyc0w foo m00000000000000000
          mmap cd95a000

          madvise 0

          procselfmem -100000000

          bash-4.1$ cat foo
          this is not a test

          Comment


          • #6
            It doesn affect Redhat 5 or Redhat 6 with default configuration, only Redhat 7, So I presume that its the same for CloudLinux and that only version 7 is vulnerable.

            Comment

            Working...
            X