A Linux kernel vulnerability allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
For more information on the vulnerability see http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html
VisibleThread Docs & ClarityGrader Cloud Servers
We patched all VisibleThread cloud servers as soon as a patch was available.
VisibleThread On-premise VMs
Note: Your VisibleThread on-premise installation is self-contained and running behind your corporate firewall, so there is very little actual risk of being impacted by this issue
VisibleThread on-premise customers running the Ubuntu 12.04 LTS operating system can patch their systems following the steps below:
1. ensure the VM can access the web so it can update to the latest kernel from the Ubuntu update site
2. run the following command from the VM shell
sudo apt-get update && sudo apt-get install linux-generic-lts-trusty
This should install the latest Kernel (v 3.13). To confirm, run the following command:
And you should see this output 3.13.0-101-generic