Register a one year .XYZ domain for just £1.99!chevron_right

close
Call us 7am - Midnight 01628 200 161My.Tsohostshopping_basket0 Item(s): £0.00
menuMenu

keyboard_backspaceBack to the Blog

Linux Dirty Cow; Fixed

Linux Dirty Cow; Fixed

Posted 01st November, 2016 by Aliysa

As you may already know, recently a vulnerability in the Linux kernel, known as Dirty Cow, was reported. Our dedicated system administrators immediately addressed the vulnerability patching all vulnerable Linux powered servers against the exploit. Read on to learn more about Dirty Cow and the steps we took to protect our systems.

How does the exploit work?

In short, Dirty Cow is a privilege-escalation vulnerability that allows any installed application, or malicious code smuggled onto a box, to elevate their privileges to that of root-level. For those of you that would like to dive deeper into the workings of the exploit, we recommend an article published by The Register.

Why is it called Dirty Cow?

The mechanism within the Linux kernel that is vulnerable is called Copy-On-Write, which when abbreviated spells COW.

Is my Linux powered server vulnerable?

No, our system administrators have patched all servers. This means that the latest CentOS kernels have been installed and machines have been rebooted where necessary in order to ensure they are not vulnerable.

Categories: Dedicated Servers, Cloud Web Hosting, Tsohost News, Security, cPanel Hosting

You may also like:

WHOIS Privacy Protection For UK Domain Names
WHOIS Privacy Protection For UK Domain Names
Cloud update: Free Let’s Encrypt SSLs now supported
Cloud update: Free Let’s Encrypt SSLs now supported
php.ini; The Small File That Makes a Big Difference
php.ini; The Small File That Makes a Big Difference
PHP 7 Now Available on the Cloud
PHP 7 Now Available on the Cloud
Data Centre Build: Phase Two
Data Centre Build: Phase Two
Fix and Protect Your Hacked WordPress Site
Fix and Protect Your Hacked WordPress Site

Cookies help us to deliver our services. By using our website, you agree to our use of cookies. Learn More

close