My.tsoHostshopping_basket0 Item(s): £0.00

keyboard_backspaceBack to the Blog

Linux Dirty Cow; Fixed

Linux Dirty Cow; Fixed

Posted 01st November, 2016 by Aliysa

As you may already know, recently a vulnerability in the Linux kernel, known as Dirty Cow, was reported. Our dedicated system administrators immediately addressed the vulnerability patching all vulnerable Linux powered servers against the exploit. Read on to learn more about Dirty Cow and the steps we took to protect our systems.

How does the exploit work?

In short, Dirty Cow is a privilege-escalation vulnerability that allows any installed application, or malicious code smuggled onto a box, to elevate their privileges to that of root-level. For those of you that would like to dive deeper into the workings of the exploit, we recommend an article published by The Register.

Why is it called Dirty Cow?

The mechanism within the Linux kernel that is vulnerable is called Copy-On-Write, which when abbreviated spells COW.

Is my Linux powered server vulnerable?

No, our system administrators have patched all servers. This means that the latest CentOS kernels have been installed and machines have been rebooted where necessary in order to ensure they are not vulnerable.

Categories: Dedicated Servers, Cloud Web Hosting, Tsohost News, Security, cPanel Hosting

You may also like:

8 ways solopreneurs can protect themselves against cybercrime
8 things you’ll only understand if you were born before the internet
5 signs you’re going to need a higher-tier hosting plan
Top hacks for saving money when you launch a business online
What sort of hosting do you need [Quick Quiz]
5 easy ways to make your business more productive