Call us 7am - Midnight 0207 855 2055My.tsoHostshopping_basket0 Item(s): £0.00

keyboard_backspaceBack to the Blog

Linux Dirty Cow; Fixed

Linux Dirty Cow; Fixed

Posted 01st November, 2016 by Aliysa

As you may already know, recently a vulnerability in the Linux kernel, known as Dirty Cow, was reported. Our dedicated system administrators immediately addressed the vulnerability patching all vulnerable Linux powered servers against the exploit. Read on to learn more about Dirty Cow and the steps we took to protect our systems.

How does the exploit work?

In short, Dirty Cow is a privilege-escalation vulnerability that allows any installed application, or malicious code smuggled onto a box, to elevate their privileges to that of root-level. For those of you that would like to dive deeper into the workings of the exploit, we recommend an article published by The Register.

Why is it called Dirty Cow?

The mechanism within the Linux kernel that is vulnerable is called Copy-On-Write, which when abbreviated spells COW.

Is my Linux powered server vulnerable?

No, our system administrators have patched all servers. This means that the latest CentOS kernels have been installed and machines have been rebooted where necessary in order to ensure they are not vulnerable.

Categories: Dedicated Servers, Cloud Web Hosting, Tsohost News, Security, cPanel Hosting

You may also like:

Give your business a free boost by taking part in our customer testimonials
Our final National Customer Care Week Q&A with Pavel K
Shining the spotlight on Denis B from our care team
Getting to know Evgeni A from customer support
A Q&A with Anton T from the customer support team
Happy National Customer Service Week