<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Linux & WebHosting Discussion and Support Forum - OS updates / Patches / Vulnerbilities]]></title>
		<link>https://serveradminsupport.com/forum/</link>
		<description><![CDATA[Linux & WebHosting Discussion and Support Forum - https://serveradminsupport.com/forum]]></description>
		<pubDate>Sat, 18 Apr 2026 13:41:37 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[DirtyCow Linux Kernel Vulnerability]]></title>
			<link>https://serveradminsupport.com/forum/showthread.php?tid=2</link>
			<pubDate>Tue, 01 Nov 2016 16:11:58 +0100</pubDate>
			<dc:creator><![CDATA[<a href="https://serveradminsupport.com/forum/member.php?action=profile&uid=7">Techyllinux</a>]]></dc:creator>
			<guid isPermaLink="false">https://serveradminsupport.com/forum/showthread.php?tid=2</guid>
			<description><![CDATA[Recently a new Vulnerability is found and is very critical one . So Hurry upto get it upgraded asap<br />
<br />
A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.<br />
<br />
Read more from the below links <br />
===================<br />
<br />
<br />
<a href="https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-dirty-cow-linux-vulnerability" target="_blank" rel="noopener" class="mycode_url">https://www.digitalocean.com/community/t...nerability</a><br />
<br />
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13" target="_blank" rel="noopener" class="mycode_url">https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13</a>]]></description>
			<content:encoded><![CDATA[Recently a new Vulnerability is found and is very critical one . So Hurry upto get it upgraded asap<br />
<br />
A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.<br />
<br />
Read more from the below links <br />
===================<br />
<br />
<br />
<a href="https://www.digitalocean.com/community/tutorials/how-to-protect-your-server-against-the-dirty-cow-linux-vulnerability" target="_blank" rel="noopener" class="mycode_url">https://www.digitalocean.com/community/t...nerability</a><br />
<br />
<a href="https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13" target="_blank" rel="noopener" class="mycode_url">https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13</a>]]></content:encoded>
		</item>
	</channel>
</rss>