Copy on Write - Dirty COW Kernel bug
Steve Beattie
sbeattie at ubuntu.com
Mon Oct 24 06:16:45 UTC 2016
Hi Ian,
On Sat, Oct 22, 2016 at 06:41:30PM +0100, Ian Bruntlett wrote:
> I stumbled across this bug here
> http://www.bbc.co.uk/news/technology-37728010
Security updates were issued for this issue, identified as
CVE-2016-5195, on Thursday, October 18. Specifically, the following
kernels address the issue:
Ubuntu 12.04 LTS 3.2.0-113.155 https://www.ubuntu.com/usn/usn-3104-1/
Ubuntu 14.04 LTS 3.13.0-100.147 https://www.ubuntu.com/usn/usn-3105-1/
Ubuntu 16.04 LTS 4.4.0-45.66 https://www.ubuntu.com/usn/usn-3106-1/
Ubuntu 16.10 4.8.0-26.28 https://www.ubuntu.com/usn/usn-3107-1/
as well as the associated derived kernels (e.g. linux-lts-xenial).
Besides being announced in the Ubuntu Security Notices referred to
above, the status for specific CVE can be found in
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
> First thing I did was quit all my programmes, ran Software Updater and
> rebooted. However, my Kernel wasn't updated (I used the command uname -a to
> check for this). When will the updated Kernel be available from the
> software updates?
It helps to report specific versions that you're seeing, i.e. what
Ubuntu release you're using as well as the kernel version. The uname -a
command can be used, but the contents of /proc/version_signature is a
little more straightforward for identifying the specific version.
Also note that you may need to refresh your apt lists information, either
via update-manager or on the command line via apt-get update.
What are the specific versions you are seeing?
Thanks.
--
Steve Beattie
<sbeattie at ubuntu.com>
http://NxNW.org/~steve/
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-quality/attachments/20161023/69d80618/attachment.pgp>
More information about the Ubuntu-quality
mailing list