Call us 7am - Midnight 01628 200 161My.Tsohostshopping_basket0 Item(s): £0.00
menuMenu

keyboard_backspaceBack to the Blog

Linux Dirty Cow; Fixed

Linux Dirty Cow; Fixed

Posted 01st November, 2016 by Aliysa

As you may already know, recently a vulnerability in the Linux kernel, known as Dirty Cow, was reported. Our dedicated system administrators immediately addressed the vulnerability patching all vulnerable Linux powered servers against the exploit. Read on to learn more about Dirty Cow and the steps we took to protect our systems.

How does the exploit work?

In short, Dirty Cow is a privilege-escalation vulnerability that allows any installed application, or malicious code smuggled onto a box, to elevate their privileges to that of root-level. For those of you that would like to dive deeper into the workings of the exploit, we recommend an article published by The Register.

Why is it called Dirty Cow?

The mechanism within the Linux kernel that is vulnerable is called Copy-On-Write, which when abbreviated spells COW.

Is my Linux powered server vulnerable?

No, our system administrators have patched all servers. This means that the latest CentOS kernels have been installed and machines have been rebooted where necessary in order to ensure they are not vulnerable.

Categories: Dedicated Servers, Cloud Web Hosting, Tsohost News, Security, cPanel Hosting

You may also like:

4 ways your web host can help secure your website
6 reasons why your website needs a captcha form
5 top WordPress security plugins to install on your website
Is your business ready for the new secure site era?
WHOIS Privacy Protection For UK Domain Names
WHOIS Privacy Protection For UK Domain Names
Cloud update: Free Let’s Encrypt SSLs now supported
Cloud update: Free Let’s Encrypt SSLs now supported