An 11-year-old flaw in the Linux copy-on-write (COW) implementation (CVE-2016-5195) is now far more exploitable due to changes to the Linux kernel design, and is being actively exploited by malicious hackers.
This vulnerability can be exploited to carry out privilege escalation attacks and hijack vulnerable systems.
Many vendors have released patches for their respective versions of Linux. Users should apply the patches released by their distro(s) immediately. Unfortunately, the vulnerable kernel is likely to remain on Linux-powered devices such as routers, Internet of Things (IoT) devices and other embedded devices.
The TuxCare team is constantly testing and fixing bugs like DirtyCOW, Heartbleed and, just as importantly, the ever-growing list of unbranded and name-less Linux Kernel CVEs that pop up daily. They are aware that fighting vulnerabilities often seem like an uphill battle for IT teams, and the goal of their unified Enterprise Linux support services is to reduce complexity and eliminate hurdles in getting good patches to the right systems, on time, automatically and with full reporting and audit capabilities.
Through its Live Patching services, TuxCare provides drop-in replacements for in-memory and in-use code, replacing vulnerable code with the correct version and ensuring systems are secure without the need for disruptive reboots or service restarts.
Your Related Advisories:
Register to Customize Your Advisories