Header background

CloudLinux and “Dirty COW” Kernel Update

A vulnerability has been discovered in the CloudLinux kernel. That may lead to a privilege escalation, denial of service, or information leaks. Known as “Dirty COW” the Linux kernel vulnerability is documented at CVE-2016-5195. In other words, this nasty bug could allow local users to write to any file they can read. The worst part is that the security flaw was present in various Linux kernel builds since at least the Linux 2.6.x series. However, some of them reached the end of life in February this year.

CloudLinux team did a good job of providing fast kernel update in order to fix CVE-2016-5195 aka Dirty COW bug. Therefore, we urge all our clients who use this system for their cPanel/WHM servers to update their kernels.

The update can be done in 1 command line, for CloudLinux 5 use the following command line:

yum install kernel-2.6.18-508.el5.lve0.8.89 --enablerepo=cloudlinux-updates-testing

For CloudLinux 6 use

yum install kernel-2.6.32-673.26.1.lve1.4.18.el6 kmod-lve-1.4-18.el6

For CloudLinux 7 use:

yum install kernel-3.10.0-427.10.1.lve1.4.22.el7 kmod-lve-1.4-22.el7

If you feel that you’re not up to this task feel free to contact our support team. We will be always able to assist you.