Dirty COW Security Vulnerability
Since the discovery of the Linux “Dirty COW” (CVE-2016-5195) security vulnerability was announced on Tuesday, October 18, it has been very visible in the media. Much of the focus has been on Linux servers which are ubiquitous today, and on networked and mobile Android devices in the embedded space.
We have integrated Dirty COW Linux kernel fixes for all Timesys supported kernel versions into the Factory (factory-20161101). To find instructions for updating your Factory version, login to your LinuxLink account, and refer to Technical Notes on the Dirty COW Vulnerability. If you don’t want to upgrade your Factory version, the page also contains a link to instructions for applying the patch on your own.
If you have any questions about the fix for the Dirty COW security vulnerability, please contact us for a free 30-minute consultation. We’d be happy to discuss with you how we can help you apply the patch and / or how we can help you with managing the security of your device.
For an overview of the issue and conditions under which the vulnerability is exposed, visit https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails.
Request a Services Consultation
Schedule a no-obligation 30-minute professional services phone consultation.
Request Support Information
Send us a request for support pricing and details.
Configure a Custom Build
Register to use LinuxLink or try it now as a guest.