CloudLinux and “Dirty COW” kernel update

A vulnerability has been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. Known as “Dirty COW” the Linux kernel vulnerability documented at CVE-2016-5195 is, in fact, a nasty bug that could have allowed local users to write to any file they can read. The worst part is that the security flaw was present in various Linux kernel builds since at least the Linux 2.6.x series, which reached the end of life in February this year.

CloudLinux team did a good job on providing fast kernel update in order to fix CVE-2016-5195 aka Dirty COW bug. We urge all our clients who are using CloudLInux for their cPanel/WHM servers to update their kernels.

The update can be done in 1 command line, for CloudLinux 5 use the following command line:

yum install kernel-2.6.18-508.el5.lve0.8.89 --enablerepo=cloudlinux-updates-testing

For CloudLinux 6 use

yum install kernel-2.6.32-673.26.1.lve1.4.18.el6 kmod-lve-1.4-18.el6

For CloudLunux 7 use:

yum install kernel-3.10.0-427.10.1.lve1.4.22.el7 kmod-lve-1.4-22.el7

If you feel that you’re not up to this task feel free to contact our support team we will be always able to assist you.