The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Linux kernel: privilege escalation via Copy On Write, Dirty COW

Synthesis of the vulnerability 

A local attacker can generate a memory corruption via a Copy On Write on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Vulnerable software: SNS, Cisco ATA, Nexus by Cisco, NX-OS, Cisco Prime Access Registrar, Cisco Prime DCNM, Cisco CUCM, Debian, NetWorker, BIG-IP Hardware, TMOS, Fedora, Android OS, HP Operations, HP Switch, Junos Space, NSM Central Manager, NSMXpress, Linux, McAfee Email Gateway, openSUSE, openSUSE Leap, Oracle Communications, Palo Alto Firewall PA***, PAN-OS, HDX, RealPresence Resource Manager, Polycom VBP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu.
Severity of this announce: 2/4.
Creation date: 20/10/2016.
Références of this computer vulnerability: 1384344, 494072, c05341463, CERTFR-2016-AVI-353, CERTFR-2016-AVI-356, CERTFR-2016-AVI-357, CERTFR-2016-AVI-370, CERTFR-2017-AVI-001, CERTFR-2017-AVI-012, CERTFR-2017-AVI-022, cisco-sa-20161026-linux, cpujul2018, CVE-2016-5195, Dirty COW, DLA-670-1, DSA-3696-1, ESA-2016-170, FEDORA-2016-c3558808cd, FEDORA-2016-db4b75b352, HPESBGN03742, HPSBHF03682, JSA10770, JSA10774, K10558632, openSUSE-SU-2016:2583-1, openSUSE-SU-2016:2584-1, openSUSE-SU-2016:2625-1, openSUSE-SU-2016:2649-1, openSUSE-SU-2020:0554-1, PAN-SA-2017-0003, PAN-SA-2017-0013, PAN-SA-2017-0014, PAN-SA-2017-0016, RHSA-2016:2098-01, RHSA-2016:2105-01, RHSA-2016:2106-01, RHSA-2016:2110-01, RHSA-2016:2118-01, RHSA-2016:2120-01, RHSA-2016:2124-01, RHSA-2016:2126-01, RHSA-2016:2127-01, RHSA-2016:2128-01, RHSA-2016:2132-01, RHSA-2016:2133-01, RHSA-2018:0180-01, SB10177, SB10178, SSA:2016-305-01, STORM-2016-006, SUSE-SU-2016:2585-1, SUSE-SU-2016:2592-1, SUSE-SU-2016:2593-1, SUSE-SU-2016:2596-1, SUSE-SU-2016:2614-1, SUSE-SU-2016:3069-1, SUSE-SU-2016:3304-1, USN-3104-1, USN-3104-2, USN-3105-1, USN-3105-2, USN-3106-1, USN-3106-2, USN-3106-3, USN-3106-4, USN-3107-1, USN-3107-2, VIGILANCE-VUL-20923, VU#243144.

Description of the vulnerability 

The Linux kernel supports the Copy On Write operation, which is used to copy memory only when it is modified.

However, a local attacker can manipulate the memory, so the COW operation writes in Read Only memory.

A local attacker can therefore generate a memory corruption via a Copy On Write on the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability impacts software or systems such as SNS, Cisco ATA, Nexus by Cisco, NX-OS, Cisco Prime Access Registrar, Cisco Prime DCNM, Cisco CUCM, Debian, NetWorker, BIG-IP Hardware, TMOS, Fedora, Android OS, HP Operations, HP Switch, Junos Space, NSM Central Manager, NSMXpress, Linux, McAfee Email Gateway, openSUSE, openSUSE Leap, Oracle Communications, Palo Alto Firewall PA***, PAN-OS, HDX, RealPresence Resource Manager, Polycom VBP, RHEL, Slackware, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu.

Our Vigil@nce team determined that the severity of this security announce is medium.

The trust level is of type confirmed by the editor, with an origin of user shell.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a beginner ability can exploit this computer vulnerability note.

Solutions for this threat 

Linux kernel: version 4.8.3.
The version 4.8.3 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.7.9.
The version 4.7.9 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.4.26.
The version 4.4.26 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 4.1.35.
The version 4.1.35 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v4.x/

Linux kernel: version 3.18.44.
The version 3.18.44 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.16.38.
The version 3.16.38 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.12.66.
The version 3.12.66 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.10.104.
The version 3.10.104 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.4.113.
The version 3.4.113 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: version 3.2.83.
The version 3.2.83 is fixed:
  https://cdn.kernel.org/pub/linux/kernel/v3.x/

Linux kernel: patch for Copy On Write.
A patch is indicated in information sources.

Android OS: patch 2016-11-06.
A patch is indicated in information sources.

Android OS: patch of 2016-12-05.
A patch is indicated in information sources.

Cisco: fixed versions for Linux.
Fixed versions are indicated in information sources.

Debian 7: new linux packages.
New packages are available:
  Debian 7: linux 3.2.82-1

Debian 8: new linux packages.
New packages are available:
  Debian 8: linux 3.16.36-1+deb8u2

EMC Networker Virtual Edition: solution for Dirty COW.
The solution is indicated in information sources.

F5 BIG-IP: fixed versions for Linux.
Fixed versions are indicated in information sources.

Fedora: new kernel packages.
New packages are available:
  Fedora 23: kernel 4.7.9-100.fc23
  Fedora 24: kernel 4.7.9-200.fc24

HPE Comware: solution for Dirty COW.
The solution is indicated in information sources.

HP Operations Analytics: solution for Dirty COW.
The solution is indicated in information sources.

Juniper NSM Appliance: patch for Upgrade Package v3.
A patch is available:
  http://www.juniper.net/support/downloads/?p=nsm#sw

Junos Space: version 16.1R1.
The version 16.1R1 is fixed:
  https://www.juniper.net/

McAfee Email Gateway: version 7.6.405h1165239.
The version 7.6.405h1165239 is fixed:
  http://www.mcafee.com/us/downloads/downloads.aspx

openSUSE 11.4: new kernel packages.
New packages are available:
  openSUSE 11.4: kernel 3.0.101-105.1

openSUSE 13.1: new kernel packages.
New packages are available:
  openSUSE 13.1: kernel 3.12.62-55.1

openSUSE 13.2: new kernel packages.
New packages are available:
  openSUSE 13.2: kernel 3.16.7-45.1

openSUSE Leap 15.1: new kubernetes packages.
New packages are available:
  openSUSE Leap 15.1: kubernetes 1.18.0-lp151.5.1, go1.14 1.14-lp151.6.1

openSUSE Leap 42.1: new kernel packages.
New packages are available:
  openSUSE Leap 42.1: kernel 4.1.34-33.1

Oracle Communications: CPU of July 2018.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2410237.1
  https://support.oracle.com/rs?type=doc&id=2406191.1
  https://support.oracle.com/rs?type=doc&id=2410234.1
  https://support.oracle.com/rs?type=doc&id=2408211.1
  https://support.oracle.com/rs?type=doc&id=2406689.1
  https://support.oracle.com/rs?type=doc&id=2408212.1
  https://support.oracle.com/rs?type=doc&id=2410243.1
  https://support.oracle.com/rs?type=doc&id=2410198.1

Palo Alto PAN-OS: version 6.1.17.
The version 6.1.17 is fixed.

Palo Alto PAN-OS: version 7.0.14.
The version 7.0.14 is fixed.

Palo Alto PAN-OS: version 7.1.8.
The version 7.1.8 is fixed.

Polycom: workaround for Dirty COW.
A workaround is indicated in the information source.

RHEL 5: new kernel packages.
New packages are available:
  RHEL 5: kernel 2.6.18-416.el5

RHEL 6.4: new kernel packages.
New packages are available:
  RHEL 6: kernel 2.6.32-358.75.1.el6

RHEL 6.6: new kernel packages.
New packages are available:
  RHEL 6: kernel 2.6.32-504.54.1.el6

RHEL 6: new kernel packages.
New packages are available:
  RHEL 6: kernel 2.6.32-642.6.2.el6, kernel 2.6.32-431.75.1.el6, kernel 2.6.32-573.35.2.el6, kernel 2.6.32-220.68.1.el6

RHEL 7 for ARM: new kernel-alt packages.
New packages are available:
  RHEL 7 for ARM: kernel-alt 4.11.0-44.4.1

RHEL 7: new kernel packages.
New packages are available:
  RHEL 7: kernel 3.10.0-327.36.3.el7

RHEL 7: new kernel-rt packages.
New packages are available:
  RHEL 7: kernel-rt 3.10.0-327.36.3.rt56.238.el7

Slackware: new kernel packages.
New packages are available:
  Slackware 14.0: kernel 3.2.83-*-1_slack14.0.txz
  Slackware 14.1: kernel 3.10.104-*-1_slack14.1
  Slackware 14.2: kernel 4.4.29-*-1_slack14.2

Spectracom SecureSync: version 5.7.0.
The version 5.7.0 is fixed.

Stormshield Network Security: version 1.6.8.
The version 1.6.8 is fixed.

SUSE LE 11 SP4: new kernel-rt packages (12/12/2016).
New packages are available:
  SUSE LE 11 SP4: kernel-rt 3.0.101.rt130-65.1

SUSE LE 12 SP1 RT: new kernel-rt packages (02/01/2017).
New packages are available:
  SUSE LE 12 SP1: kernel-rt 3.12.67-60.27.1

SUSE LE: new kernel packages.
New packages are available:
  SUSE LE 11 SP2: kernel 3.0.101-0.7.44.1
  SUSE LE 11 SP3: kernel 3.0.101-0.47.90.1
  SUSE LE 11 SP4: kernel 3.0.101-84.1
  SUSE LE 12 RTM: kernel 3.12.60-52.57.1
  SUSE LE 12 SP1: kernel 3.12.62-60.64.8.2

Synology DiskStation Manager: fixed version.
The version 6.0.? will be fixed:
  https://www.synology.com/
The bulletin VIGILANCE-SOL-49365 indicates a new DS/RS version.

Synology DS/RS: version 6.0.2-8451-3.
The version 6.0.2-8451-3 is fixed:
  https://www.synology.com/

Ubuntu 12.04: new linux-image-3.2.0 packages.
New packages are available:
  Ubuntu 12.04 LTS: linux-image-3.2.0-113 3.2.0-113.155, linux-image-3.2.0-1491-omap4 3.2.0-1491.118

Ubuntu 14.04: new linux-image-4.4.0 packages.
New packages are available:
  Ubuntu 14.04 LTS: linux-image-4.4.0-45-generic 4.4.0-45.66~14.04.1, linux-image-4.4.0-45-generic 4.4.0-45.66, linux-image-4.4.0-1029-raspi2 4.4.0-1029.36, linux-image-4.4.0-1032-snapdragon 4.4.0-1032.36

Ubuntu 16.10: new linux-image-4.8.0 packages.
New packages are available:
  Ubuntu 16.10: linux-image-4.8.0-26-generic 4.8.0-26.28, linux-image-4.8.0-1017-raspi2 4.8.0-1017.20

Ubuntu: new linux-image-3.13.0 packages.
New packages are available:
  Ubuntu 12.04 LTS: linux-image-3.13.0-100-generic 3.13.0-100.147~precise1
  Ubuntu 14.04 LTS: linux-image-3.13.0-100-generic 3.13.0-100.147

Wind River Linux: solution for CVE-2016-5195.
The solution is indicated in information sources.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computer security database. The Vigil@nce vulnerability database contains several thousand vulnerabilities.