Support Center > Search Results > SecureKnowledge Details
Check Point response to CVE-2016-5195 (Dirty Cow)
Symptoms
  • A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.
    This issue was assigned CVE-2016-5195.
Solution

This vulnerability is a local privilege escalation bug that affects only kernel versions 2.6.22 and higher.

Check Point Gaia OS and SecurePlatform OS are based on hardened kernel versions 2.6.18 (or lower).

This vulnerability is irrelevant to Check Point operating systems, because all users on Check Point operating systems are system administrators (and only they should have local access)

 

Check Point strives to make the customers' systems as secure as possible.
Therefore, the official resolution (published by RHEL/Linux mainstream) was implemented and is included in:

 

For other supported versions, Check Point Support can supply a Hotfix.
A Support Engineer will make sure the Hotfix is compatible with your environment before providing the Hotfix.
For faster resolution and verification, please collect CPinfo files from the Gaia / SecurePlatform OS machine involved in the case.

Applies To:
  • 02381229 , 02441724 , 02383186 , 02382720 , 02469711 , 02438466 , 02387864

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment