{"id":28382,"date":"2016-11-04T21:01:04","date_gmt":"2016-11-04T13:01:04","guid":{"rendered":"https:\/\/www.hongkiat.com\/blog\/?p=28382"},"modified":"2023-04-06T19:02:57","modified_gmt":"2023-04-06T11:02:57","slug":"dirty-cow-linux-exploit","status":"publish","type":"post","link":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/","title":{"rendered":"Protect Your Linux: Act Now Against &#8216;Dirty COW&#8217; Exploits"},"content":{"rendered":"<p>If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers <a href=\"https:\/\/www.computing.co.uk\/?v3\">have begun exploiting<\/a> a Linux kernel security flaw known as \u201cDirty COW\u201d.<\/p>\n<p>\u201cDirty COW\u201d is a <strong>privilege escalation bug<\/strong> that affects all Linux-based operating systems. This bug is triggered when hackers exploit the race condition in the implementation of Linux\u2019s copy-on-write (COW) mechanism, which is a resource management technique used to implement a \u201ccopy\u201d operation on modifiable resources efficiently.<\/p>\n<p>By exploiting this vulnerability, the hacker would be able to <strong>gain elevated access<\/strong>, thereby <strong>allowing them to hijack the entire system<\/strong> if they want to.<\/p>\n<p class=\"recommended_top\">\n\t\t\t\t\t<strong>Read Also:<\/strong>\u00a0\n\t\t\t\t\t<a target=\"_blank\" href=\"https:\/\/www.hongkiat.com\/blog\/linux-commands-to-avoid\/\">9 Dangerous Linux Commands You Should Avoid<\/a>\n\t\t\t\t<\/p>\n<p class=\"video-19by6\"><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/kEsshExn7aE\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>This vulnerability isn\u2019t particularly new, as Linus Torvalds himself discovered the flaw 11 years ago. At the time, Torvalds himself was unable to fix the issue, and as such, he left the flaw alone since it was deemed \u201chard to trigger\u201d anyways.<\/p>\n<p>In a twist of events, this flaw has been made far more exploitable thanks to changes in Linux\u2019s kernel design.<\/p>\n<p>According to Phil Oester, the Linux security researcher who uncovered the flaw, the \u201cDirty COW\u201d exploit is deemed easy to execute. \u201cThe exploit in the wild is trivial to execute, never fails and has probably<a href=\"https:\/\/nakedsecurity.sophos.com\/2016\/10\/21\/linux-kernel-bug-dirtycow-easyroot-hole-and-what-you-need-to-know\/\"> been around for years<\/a> \u2013 the version I obtained was compiled with GCC 4.8\u2033 says Oester.<\/p>\n<p>Since Oester discovered the exploit, vendors such as Red Hat, Debian and Ubuntu have released patches for their respective Linux versions. Read more about these patches <a href=\"https:\/\/dirtycow.ninja\/\">here<\/a>.<\/p>\n<p>Now, for the bad news: it is likely that the vulnerable kernel will remain in Linux-powered devices such as routers, Internet-of-Things devices and other embedded devices.<\/p>\n<p>As Android is based on Linux, the OS is also susceptible to the \u201cDirty COW\u201d exploit.<\/p>\n<p>Android will most likely be receiving a patch that would fix this vulnerability, but it won\u2019t arrive until Android releases its patch batch next month. Note that even then, some of the Android devices currently in circulation may not get the patch due to limitations set by manufacturers and carriers.<\/p>","protected":false},"excerpt":{"rendered":"<p>If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers have begun exploiting a Linux kernel security flaw known as \u201cDirty COW\u201d. \u201cDirty COW\u201d is a privilege escalation bug that affects all Linux-based operating systems. This bug is triggered when hackers exploit the&hellip;<\/p>\n","protected":false},"author":157,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3398,3976],"tags":[888,4601],"topic":[4523,4521],"class_list":["entry-content","is-maxi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protect Your Linux: Act Now Against &#039;Dirty COW&#039; Exploits - Hongkiat<\/title>\n<meta name=\"description\" content=\"If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers have begun exploiting a Linux kernel\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Linux: Act Now Against &#039;Dirty COW&#039; Exploits\" \/>\n<meta property=\"og:description\" content=\"If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers have begun exploiting a Linux kernel\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/\" \/>\n<meta property=\"og:site_name\" content=\"Hongkiat\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hongkiatcom\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-04T13:01:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-06T11:02:57+00:00\" \/>\n<meta name=\"author\" content=\"Sia\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:site\" content=\"@hongkiat\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sia\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/\"},\"author\":{\"name\":\"Sia\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/25661c0ca5beef807a38c0d038894641\"},\"headline\":\"Protect Your Linux: Act Now Against &#8216;Dirty COW&#8217; Exploits\",\"datePublished\":\"2016-11-04T13:01:04+00:00\",\"dateModified\":\"2023-04-06T11:02:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/\"},\"wordCount\":352,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"keywords\":[\"Linux\",\"Security and Privacy\"],\"articleSection\":[\"Internet\",\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/\",\"name\":\"Protect Your Linux: Act Now Against 'Dirty COW' Exploits - Hongkiat\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\"},\"datePublished\":\"2016-11-04T13:01:04+00:00\",\"dateModified\":\"2023-04-06T11:02:57+00:00\",\"description\":\"If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers have begun exploiting a Linux kernel\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/dirty-cow-linux-exploit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Linux: Act Now Against &#8216;Dirty COW&#8217; Exploits\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"name\":\"Hongkiat\",\"description\":\"Tech and Design Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#organization\",\"name\":\"Hongkiat.com\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/wp-content\\\/uploads\\\/hkdc-logo-rect-yoast.jpg\",\"width\":1200,\"height\":799,\"caption\":\"Hongkiat.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/hongkiatcom\",\"https:\\\/\\\/x.com\\\/hongkiat\",\"https:\\\/\\\/www.pinterest.com\\\/hongkiat\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/#\\\/schema\\\/person\\\/25661c0ca5beef807a38c0d038894641\",\"name\":\"Sia\",\"description\":\"A tech journalist for Hongkiat.com, Sia writes reviews on new products and services in the tech industry.\",\"url\":\"https:\\\/\\\/www.hongkiat.com\\\/blog\\\/author\\\/sia\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protect Your Linux: Act Now Against 'Dirty COW' Exploits - Hongkiat","description":"If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers have begun exploiting a Linux kernel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Linux: Act Now Against 'Dirty COW' Exploits","og_description":"If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers have begun exploiting a Linux kernel","og_url":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/","og_site_name":"Hongkiat","article_publisher":"https:\/\/www.facebook.com\/hongkiatcom","article_published_time":"2016-11-04T13:01:04+00:00","article_modified_time":"2023-04-06T11:02:57+00:00","author":"Sia","twitter_card":"summary_large_image","twitter_creator":"@hongkiat","twitter_site":"@hongkiat","twitter_misc":{"Written by":"Sia","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/#article","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/"},"author":{"name":"Sia","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/25661c0ca5beef807a38c0d038894641"},"headline":"Protect Your Linux: Act Now Against &#8216;Dirty COW&#8217; Exploits","datePublished":"2016-11-04T13:01:04+00:00","dateModified":"2023-04-06T11:02:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/"},"wordCount":352,"commentCount":1,"publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"keywords":["Linux","Security and Privacy"],"articleSection":["Internet","News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/","url":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/","name":"Protect Your Linux: Act Now Against 'Dirty COW' Exploits - Hongkiat","isPartOf":{"@id":"https:\/\/www.hongkiat.com\/blog\/#website"},"datePublished":"2016-11-04T13:01:04+00:00","dateModified":"2023-04-06T11:02:57+00:00","description":"If you own a server, computer, an Android phone or any other device that runs Linux, you need to read this. Hackers have begun exploiting a Linux kernel","breadcrumb":{"@id":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.hongkiat.com\/blog\/dirty-cow-linux-exploit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hongkiat.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect Your Linux: Act Now Against &#8216;Dirty COW&#8217; Exploits"}]},{"@type":"WebSite","@id":"https:\/\/www.hongkiat.com\/blog\/#website","url":"https:\/\/www.hongkiat.com\/blog\/","name":"Hongkiat","description":"Tech and Design Tips","publisher":{"@id":"https:\/\/www.hongkiat.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hongkiat.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hongkiat.com\/blog\/#organization","name":"Hongkiat.com","url":"https:\/\/www.hongkiat.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","contentUrl":"https:\/\/www.hongkiat.com\/blog\/wp-content\/uploads\/hkdc-logo-rect-yoast.jpg","width":1200,"height":799,"caption":"Hongkiat.com"},"image":{"@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hongkiatcom","https:\/\/x.com\/hongkiat","https:\/\/www.pinterest.com\/hongkiat\/"]},{"@type":"Person","@id":"https:\/\/www.hongkiat.com\/blog\/#\/schema\/person\/25661c0ca5beef807a38c0d038894641","name":"Sia","description":"A tech journalist for Hongkiat.com, Sia writes reviews on new products and services in the tech industry.","url":"https:\/\/www.hongkiat.com\/blog\/author\/sia\/"}]}},"jetpack_featured_media_url":"https:\/\/","jetpack_shortlink":"https:\/\/wp.me\/p4uxU-7nM","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/28382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/comments?post=28382"}],"version-history":[{"count":3,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/28382\/revisions"}],"predecessor-version":[{"id":65620,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/posts\/28382\/revisions\/65620"}],"wp:attachment":[{"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/media?parent=28382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/categories?post=28382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/tags?post=28382"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.hongkiat.com\/blog\/wp-json\/wp\/v2\/topic?post=28382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}