-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Dirty COW (CVE-2016-5195) Dirty COW (CVE-2016-5195) is a privilege escalation vulnerability in the Linux Kernel. A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. What does this mean for cPanel servers? The Linux kernel is provided by your operating system vendor, which is one of Red Hat, CentOS, or Cloud Linux. At the time of the creation of this post, no new Kernel packages have been published. How do I update once the new Kernel patches come out? 1. Log into your server via SSH with root privileges 2. Run “yum clean all” to clear YUM’s local caches 3. Run “yum update” to install the patched version of the kernel once available. 4. After your kernel is updated you must reboot the system. Is there a mitigation technique available? RedHat has provided the following mitigation that should only be attempted by experienced Systems Administrators. https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13 We will update this post with more information as it becomes available and as the vendors deploy updated kernel images. Please see the following links for further information: https://access.redhat.com/security/cve/cve-2016-5195 https://bugzilla.redhat.com/show_bug.cgi?id=1384344 https://security-tracker.debian.org/tracker/CVE-2016-5195 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=19be0eaffa3ac7d8eb6784ad9bdbc7d67ed8e619 https://lkml.org/lkml/2016/10/19/860 https://dirtycow.ninja https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails https://twitter.com/DirtyCOWVuln -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJYCmQHAAoJEJUhvtyr2U3fp7IP/28cUxbOlLL/sGRZEDdqn3/m VxKZdsdXRSQo3qSulIbkeVzYwaOmBbuRJG2TqZBH9DmnPdwIcLpd4SlA7dbWqM2i s1MC/fHknXVoYhzICVBF1frFOCr35EaSl5zobyq8JKVcx4BL4nbfgRaxSBy2UOnK efueQYayLf0K6yFE+msFrVuynNfkFW7yZCZFFU2eAc2OMYuxAPh0uGSmUE7krEO6 j+W+Y/MHwe3MsIO0y5iuTels2YSdhO17a3Q4TAL/HQDgB0r5Hh/Uy3Aqb/F/jRqR cuXbVAkklpchFRLV42ZCzgV223zp7fevFFzqr3Ezv5jH8RLztoPjqPHEArtqcAiw cQ4vSRAfu9xUg9CvhVZMaODy3X47enNZRsHyrtzXu+q5mi+4q8QgFzltWsSaIl5k xP4yQCSMqvmX4ooEI/bg5+F3CsWp2mun65BpyXkmJF3YKLrJ4xU6Os5SQuxtOUpX xyIhmH6jTY4psG8+KabtkJAZm76F0p18HRFR5OhqXMpR9NTrgjpIgC4PaKeZvgZP d2eY19f5cQO9b1yvpBmRmcKff+2Kio7jYnYKmPWk1JHMCrRxBU1ggmUXKqWe5bhi Kezwh7tQqfYCDZPrjjtJoQQgiK3m8rzevuIe9QZy9se2H6UfUssqWhEEsRuhXK5d uhkjmmZCXMHsB4URWVXJ =BJfZ -----END PGP SIGNATURE-----