-
Notifications
You must be signed in to change notification settings - Fork 688
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update kernel and patch Dirty COW (CVE-2016-5195) #1481
Comments
We're working on this. See freedomofpress/ansible-role-grsecurity#80 for EOL updates, moving Trusty kernels over to the 4.x series. #1245 is creating complications in the automatic updates strategy, so we may need to patch the Ubuntu overlay scripts to set the required PaX flags. |
We are beginning testing on a new 3.14.Z kernel in an effort to get a new kernel out as fast as possible (rather than switching to the 4.4.Z series immediately, which could cause roadblocks, though we do intend to switch over in the near future). The latest |
We published new kernel images based on 3.14.79 (including Dirty COW mitigations via grsecurity patches, as @fowlslegs mentioned) yesterday. All existing instances should have upgraded automatically by now. If you have any trouble, contact us at [email protected]. |
The Linux kernel that runs on SecureDrop servers (3.14.48) is overdue for an update; not only is 3.14 EOL'd, but it's vulnerable to a critical privilege escalation vulnerability. Specifically, a race condition in the memory subsystem can allow an unprivileged local user to gain superuser write access and escalate privileges.
The text was updated successfully, but these errors were encountered: