Search Engine: Elastic

Article ID: 129680, created on Oct 24, 2016, last review on Sep 15, 2017

  • Applies to:
  • Operations Automation 6.0
  • Operations Automation 5.5


A root privileges escalation was recently discovered in Linux kernel. An unprivileged local user could use flaw in Linux memory subsystem to gain write access to otherwise read-only memory mappings and thus increase privileges on the system. This vulnerability was identified as CVE-2016-5195 and got unofficial name "Dirty Cow". More information could be obtained on CVE-2016-5195 information page.

How it affects Odin Automation infrastructure

Despite that CVE-2016-5195 affects all Linux kernels since version 2.6.22 and could be reproduced on all distributions.

In Odin Automation environment components at most risk are:

  1. Shared web hosting (NG and legacy), since users may have SSH access to their webspaces.
  2. Virtuozzo/PCS-based servers included in Odin Automation for Cloud Infrastructure
  3. RedHat/CentOS-based virtual machines and containers provided by OACI module


Please, follow instructions from the following dedicated articles to ensure that your system is protected from CVE-2016-5195:

  1. CloudLinux instructions.
  2. RedHat and CentOS instructions.
  3. Virtuozzo already released updates for Virtuozzo 6.0, Virtuozzo Containers 4.7 and Parallels Server Bare Metal 5.0.

5356b422f65bdad1c3e9edca5d74a1ae caea8340e2d186a540518d08602aa065 e12cea1d47a3125d335d68e6d4e15e07 956c448bddc7e1f3585373687602379f 6f1456866eed87488c0f02b298a741c0 5b048d9bddf8048a00aba7e0bdadef37 2554725ed606193dd9bbce21365bed4e

Email subscription for changes to this article
Save as PDF