Dirty COW Security Vulnerability
Since the discovery of the Linux “Dirty COW” (CVE-2016-5195) security vulnerability was announced on Tuesday, October 18, it has been very visible in the media. Much of the focus has been on Linux servers which are ubiquitous today, and on networked and mobile Android devices in the embedded space.
We have integrated Dirty COW Linux kernel fixes for all Timesys supported kernel versions into the Factory (factory-20161101). To find instructions for updating your Factory version, login to your LinuxLink account, and refer to Technical Notes on the Dirty COW Vulnerability. If you don’t want to upgrade your Factory version, the page also contains a link to instructions for applying the patch on your own.
If you have any questions about the fix for the Dirty COW security vulnerability, please contact us for a free 30-minute consultation. We’d be happy to discuss with you how we can help you apply the patch and / or how we can help you with managing the security of your device.
For an overview of the issue and conditions under which the vulnerability is exposed, visit https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails.
Have a project you’d like to discuss?
We’d be happy to discuss your project and answer any questions you have. For more information about our security solution or any of our offerings, fill out our online form, contact us email@example.com or call us at 1.866.392.4897 (toll-free) or +1.412.232.3250.