“Today, October 20, 2016, Linux kernel maintainer Greg Kroah-Hartman announced three new maintenance updates for the Linux 4.8, 4.7, and 4.4 LTS kernel series, patching a major security vulnerability.
Known as “Dirty COW,” the Linux kernel vulnerability documented at CVE-2016-5195 is, in fact, a nasty bug that could have allowed local users to write to any file they can read. The worst part is that the security flaw was present in various Linux kernel builds since at least the Linux 2.6.x series, which reached end of life in February this year.”
See Linux Kernels 4.8.3, 4.7.9 & 4.4.26 LTS Out to Patch “Dirty COW” Security FlawOuch! This could be a pathway to rooting */Linux machines all over the world. At first I thought I had fixed this here but I missed one machine in the living room that used one of those series of kernels. Fixing it as I type.
Having lived for a decade with a gaping vulnerability it gives little comfort to think those who use That Other OS live with such updates almost monthly.