Distil Networks has addressed the vulnerability known as “Dirty COW.” This vulnerability is a race condition that can be exploited to allow an unprivileged local user the ability to increase their overall privilege and gain access to a system.
Additional information can be located here: https://dirtycow.ninja
Below is a table that summarizes the actions Distil Networks is taking. No action is required on your part unless you host a Distil Appliance on-premises, in which case you must restart your machine.
Customer Type |
Distil Action |
Customer Action |
Dates |
Public Cloud Customers |
Upgrade Kernel, Rolling Reboot |
None required |
Nov. 7 |
Private Cloud Customers |
Upgrade Kernel, Rolling Reboot |
None Required |
Nov. 7 |
Private On-Site Customers |
Upgrade Kernel |
Machine Restart or provide Distil Support a date and time to complete restart |
Customer Specific |
Private On-Site customers should complete their machine restarts or have them scheduled by November 21st, 2017.
If you have any questions regarding this notice, please reach out to the Distil Support Team.
Comments