What I'd like to know is how this bug is exploitable.
It's a privilege escalation bug. So, they'd either need to login to your box/device as a non-root user, or they'd have to remotely exploit a bug in a program (such as a web browser or media player) to execute code which can then get root and do whatever it wants.
So, if your box or device is otherwise well-secured, then the risk isn't terribly high. But security holes in Java, web browsers, and the libraries they use are being discovered all the time. So, I think it's fair to say there's
some risk to client devices like phones and desktops.
Of course, if you install & run untrusted apps, they might be trojans/malware that can more easily exploit this to take over your device and add it to a bot net, etc.
techy1966 :
Dirty Cow who names these?
The article says:
Dirty COW has been so named because the bug affects the Copy On Write (COW) resource management mechanism.
The word "dirty" refers to the way the virtual memory management system tags memory pages as being "dirty", when they contain modifications.
I don't know if this is any sort of official name, or just how the kernel developer community is informally referring to it.