Dirty COW (CVE-2016-5195) is a local privilege escalation vulnerability. Do not ignore this bug.

A race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. A local unprivileged user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. In other words, the normal user can overwrite files they are allowed just to read it. For example, /etc/passwd can be edited or deleted by a normal user. The vulnerability easily exploited with a local shell account.

ADVERTISEMENTS

How old is this bug?

I can not belive, but bug existed for in the kernel for eleven years, to give normal users full root access.

How do I fix my server or desktop powered by Linux?

Apply fix ASAP:

If you just want the Kernel patch to go here.

What about my Android phone?

You need to wait to get an update (also known as firmware ROM) from your phone manufacturer.

🐧 If you liked this page, please support my work on Patreon or with a donation.
🐧 Get the latest tutorials on SysAdmin, Linux/Unix, Open Source & DevOps topics via:
CategoryList of Unix and Linux commands
File Managementcat
FirewallAlpine Awall CentOS 8 OpenSUSE RHEL 8 Ubuntu 16.04 Ubuntu 18.04 Ubuntu 20.04
Network Utilitiesdig host ip nmap
OpenVPNCentOS 7 CentOS 8 Debian 10 Debian 8/9 Ubuntu 18.04 Ubuntu 20.04
Package Managerapk apt
Processes Managementbg chroot cron disown fg jobs killall kill pidof pstree pwdx time
Searchinggrep whereis which
User Informationgroups id lastcomm last lid/libuser-lid logname members users whoami who w
WireGuard VPNAlpine CentOS 8 Debian 10 Firewall Ubuntu 20.04
0 comments… add one

Leave a Reply

Your email address will not be published. Required fields are marked *

Use HTML <pre>...</pre>, <code>...</code> and <kbd>...</kbd> for code samples.