This story has also been reported today (21/10/2016) on The Register: http://www.theregister.co.uk/2016/10/21/linux_privilege_escalation_hole/
According to reports in the story;
According to a website dedicated to Dirty COW, a patch for the Linux kernel has been developed, and major vendors including Red Hat, Debian and Ubuntu have already released fixes for their respective Linux flavors.
Running the usual software update mechanisms, such as Debian's apt-get, will fetch and install the patches. Don't forget to reboot after to pick up the new kernel. If you use a distro that does not make /proc/self/mem writable, such as Red Hat Enterprise Linux 5 and 6, then the exploit code fails.
Not sure if this will have actioned through VM's running symbiosis but maybe somebody could confirm this..?