CoreOS Linux has been patched to address DirtyCOW

34 views
Skip to first unread message

Alex Crawford

unread,
Oct 21, 2016, 3:20:40 PM10/21/16
to coreo...@googlegroups.com
The "Dirty COW" privilege escalation vulnerability in the Linux kernel,
as reported in CVE-2016-5195 [1], has been patched in CoreOS Linux. The
update is currently rolling out to the Alpha [1192.2.0], Beta
[1185.2.0], and Stable [1122.3.0] channels. If automatic updates are
enabled (the default configuration), your server should be patched
within the next several hours (if it hasn’t already received the
update).

If automatic updates are disabled, you can force an update by running
`update_engine_client -check_for_update`.

-Alex

[1]: https://dirtycow.ninja/
[1192.2.0]: https://coreos.com/releases/#1192.2.0
[1185.2.0]: https://coreos.com/releases/#1185.2.0
[1122.3.0]: https://coreos.com/releases/#1122.3.0
signature.asc
Reply all
Reply to author
Forward
0 new messages