Follow

Important Actions to Address the Dirty COW Vulnerability (CVE-2016-5195) - November 7th, 2016

Distil Networks has addressed the vulnerability known as “Dirty COW.” This vulnerability is a race condition that can be exploited to allow an unprivileged local user the ability to increase their overall privilege and gain access to a system.

Additional information can be located here: https://dirtycow.ninja

Below is a table that summarizes the actions Distil Networks is taking. No action is required on your part unless you host a Distil Appliance on-premises, in which case you must restart your machine.

Customer Type

Distil Action

Customer Action

Dates

Public Cloud Customers

Upgrade Kernel, Rolling Reboot

None required

Nov. 7

Private Cloud Customers

Upgrade Kernel, Rolling Reboot

None Required

Nov. 7

Private On-Site Customers

Upgrade Kernel

Machine Restart or provide Distil Support a date and time to complete restart

Customer Specific


Private On-Site customers should complete their machine restarts or have them scheduled by November 21st, 2017.

If you have any questions regarding this notice, please reach out to the Distil Support Team.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments