The operating system that lies at the core of most servers on the internet and most smartphones has a critical vulnerability which has existed, unnoticed, for nine years.
Called “Dirty Cow” (because it exploits a mechanism called copy-on-write), the bug allows an attacker to gain privilege escalation on the Linux kernel.
Linux, a free open-source operating system, is at the heart of a huge number of applications, but its most well-known uses are in webservers (under brand names such as Red Hat, Ubuntu and Debian) and as the core of Android, Google’s operating system for smartphones.
Because it’s open-source, anyone can see, re-use, and suggest edits to the core source code, which is usually thought to increase the security of the operating system: many eyes means a higher chance of someone spotting, and fixing, bugs.
But the Dirty Cow bug – officially called CVE–2016–5195 – was originally introduced to the kernel nine years ago, and has been sitting unnoticed for much of that time. In fact, research published this week claimed that the typical Linux bug reaches about five years old before it is fixed.
Dirty Cow is a class of vulnerability known as a “privilege escalation bug”, which means that it allows an attacker which has already gained some measure of control over a specific computer to leverage that into total control.
According to Phil Oester, the researcher who found the bug, an exploit taking advantage of Dirty Cow has already been found in the wild.
But the research team warn that while Dirty Cow is serious, it shouldn’t distract from the more workaday bugs, which are found regularly. “All the boring normal bugs are way more important, just because there’s a lot more of them. I don’t think some spectacular security hole should be glorified or cared about as being any more ‘special’ than a random spectacular crash due to bad locking.” The major issue with the bug isn’t its danger, but its age: it is easy to exploit reliably, and thanks to the nine years it’s been hiding in the code, it will be in millions of computers.
The bug is already patched on some of the major versions of Linux, including Red Hat, Debian and Ubuntu. But for millions of other devices that run Linux, particularly embedded versions of the operating system, the patch will be difficult to apply, and potentially nonexistent.
That also applies to Android: the mobile operating system is affected. While top-end Android devices, such as the Galaxy S7 and Pixel, receive regular security updates, the vast majority of Android devices sold receive few, if any, post-sale updates.
Google declined to comment, but confirmed that Android is one of the Linux distributions affected. The company has posted a Partner Security Advisory to alert Android partners, one of the steps to those partners then issuing a patch
Cloud Computing, iT news |
September 20, 2016
Apple, Amazon Unveil Major Renewable Energy Deals to Power Cloud Data Centers
Brought to you by Data Center Knowledge The current surge of data center construction projects by internet and cloud giants is accompanied by a surge in investment in renewable energy...
Cloud Computing, iT news |
August 23, 2016
Blockchain’s Backers Gather to Push Governance for Technology
(Bloomberg) — Some of blockchain’s biggest backers, including people with ties to IBM and JPMorgan, will gather Wednesday to work on the biggest issue hobbling the technology behind digital currency...
Cloud Computing |
July 8, 2016
Rackspace Offers Partners Ability to Resell Azure, Office 365, Serving Up Scale and Support
With a recent report suggesting Microsoft Azure could overtake Amazon Web Services (AWS) as the most popular cloud by 2019, news out of Rackspace this week that it will offer...
Cloud Computing, iT news |
June 9, 2016
Wix Takes Aim at Squarespace With AI-Driven Website Creator
By Gwen Ackerman and Gabrielle Coppola (Bloomberg) — While companies such as Squarespace Inc. or Weebly Inc. will help you craft an attractive modern website, it’s still up to the...
Cloud Computing |
May 18, 2016
Cloud-Based Security Solutions Encourage Faster Deployment: Report
Nearly half of all information security professionals said faster deployment is the top driver of cloud-based security solutions, according to a report released Tuesday by CloudPassage. The 2016 LinkedIn Cloud...
Cloud Computing |
April 15, 2016
Friday’s Five: A Handful of Tech Headlines You May Have Missed, April 15
As we head into the weekend there’s that nagging feeling that you may have missed something. You’re busy, and it’s hard to keep up with every piece of news that...
iT news, Networking |
March 16, 2016
Merger of Two Healthcare Giants Makes IT Transformation Inevitable
Brought to you by Data Center Knowledge How do you scale your IT infrastructure to three times its capacity while your budget stays about the same? This was the question...
Security |
February 12, 2016
Backdoor Access to US Data Would do Nothing to Stop Availability of Encryption: Report
Proposals from lawmakers to force US companies to provide government agencies with backdoors to encrypted data would put them at a competitive disadvantage, without reducing the global availability of encryption,...
iT news, Security |
January 7, 2016
Linode Forces Password Resets After Unauthorized Access Detected
UPDATE: In a statement emailed to the WHIR on Jan. 8, 2016, Linode said that there is “no evidence that any customer information could have been accessed beyond the user...
Cloud Computing, iT news |
December 22, 2015
Pivotal Adds Cloud Foundry Expertise, European Clout with CloudCredo Acquisition
Development software provider Pivotal has acquired London-based CloudCredo to boost its expertise and European presence in the Cloud Foundry market, the companies announced Monday. CloudCredo was founded in 2013, and...