The following warnings occurred: | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Warning [2] "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? - Line: 613 - File: inc/plugins/myadvertisements.php PHP 7.3.33 (Linux)
|
DirtyCow Linux Kernel Vulnerability - Printable Version +- Linux & WebHosting Discussion and Support Forum (https://serveradminsupport.com/forum) +-- Forum: News / Security Updates / Security Related stuffs (https://serveradminsupport.com/forum/forumdisplay.php?fid=17) +--- Forum: OS updates / Patches / Vulnerbilities (https://serveradminsupport.com/forum/forumdisplay.php?fid=18) +--- Thread: DirtyCow Linux Kernel Vulnerability (/showthread.php?tid=2) |
DirtyCow Linux Kernel Vulnerability - Techyllinux - 11-01-2016 Recently a new Vulnerability is found and is very critical one . So Hurry upto get it upgraded asap A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. Read more from the below links =================== https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-dirty-cow-linux-vulnerability https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13 RE: DirtyCow Linux Kernel Vulnerability - Edward - 11-02-2016 Hi This is very serious one and we have already patched almost all the servers which I manage. Thanks for the heads up |