{"id":194,"date":"2016-10-28T17:44:53","date_gmt":"2016-10-28T17:44:53","guid":{"rendered":"http:\/\/www.urolime.com\/blogs\/in\/?p=194"},"modified":"2016-10-31T13:19:47","modified_gmt":"2016-10-31T13:19:47","slug":"dirty-cow-vulnerability-fix","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/","title":{"rendered":"Dirty COW &#8211; Vulnerability Fix"},"content":{"rendered":"<p><strong>Dirty COW [ CVE-2016-5195 ]<\/strong><\/p>\n<p><strong>COW -&gt;<\/strong> <strong>Copy &#8211; On &#8211; Write<\/strong><\/p>\n<figure id=\"attachment_195\" aria-describedby=\"caption-attachment-195\" style=\"width: 300px\" class=\"wp-caption alignnone\"><a href=\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-195 size-medium\" title=\"Dirty Cow\" src=\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg\" alt=\"Dirty Cow\" width=\"300\" height=\"169\" srcset=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg 300w, https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-500x282.jpg 500w, https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched.jpg 760w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-195\" class=\"wp-caption-text\"><\/p>\n<h2> Dirty Cow <\/h2>\n<p><\/figcaption><\/figure>\n<p><strong>Dirty COW<\/strong> is actually an old vulnerability , which has driven back after 10 long years. The issue was first identified by Linus Torvalds and found some difficulties to patch the issue. The vulnerability is also called privilege-escalation vulnerability. In which the normal user in the server will get the root level privileges. Almost all the Linux flavors have this issue, due to which the Linux Kernel is affected by the vulnerability and an installed malicious app will get the root level access and get all the data from your server.<\/p>\n<p><strong>The following Red Hat OS are infected:<\/strong><\/p>\n<blockquote><p>Red Hat Enterprise Linux 5<br \/>\nRed Hat Enterprise Linux 6<br \/>\nRed Hat Enterprise Linux 7<br \/>\nRed Hat Enterprise MRG 2<br \/>\nRed Hat Openshift Online v2<br \/>\nRed Hat Virtualization (RHEV-H\/RHV-H)<\/p><\/blockquote>\n<p>To check your RedHat version is effected or not:<\/p>\n<blockquote><p>wget https:\/\/access.redhat.com\/sites\/default\/files\/rh-cve-2016-5195_3.sh<br \/>\nchmod 755 rh-cve-2016-5195_3.sh<br \/>\nsrc]#.\/rh-cve-2016-5195_3.sh<br \/>\n<strong>Your kernel is 2.6.32-431.el6.x86_64 which IS vulnerable.<\/strong><br \/>\nRed Hat recommends that you update your kernel. Alternatively, you can apply partial<br \/>\nmitigation described at https:\/\/access.redhat.com\/security\/vulnerabilities\/2706661 .<\/p><\/blockquote>\n<p><strong>The erlier version of the following UBUNTU OS are infected:<\/strong><\/p>\n<blockquote><p>4.8.0-26.28 for Ubuntu 16.10<br \/>\n4.4.0-45.66 for Ubuntu 16.04 LTS<br \/>\n3.13.0-100.147 for Ubuntu 14.04 LTS<br \/>\n3.2.0-113.155 for Ubuntu 12.04 LTS<\/p><\/blockquote>\n<p><strong><br \/>\nAmazon OS:<\/strong><br \/>\nAmazon patched all their kernal version for the C-O-W, The patched versions are given below:<\/p>\n<p>x86_64:<br \/>\nkernel-tools-devel-4.4.23-31.54.amzn1.x86_64<br \/>\nkernel-4.4.23-31.54.amzn1.x86_64<br \/>\nkernel-tools-debuginfo-4.4.23-31.54.amzn1.x86_64<br \/>\nperf-debuginfo-4.4.23-31.54.amzn1.x86_64<br \/>\nkernel-devel-4.4.23-31.54.amzn1.x86_64<br \/>\nkernel-tools-4.4.23-31.54.amzn1.x86_64<br \/>\nperf-4.4.23-31.54.amzn1.x86_64<br \/>\nkernel-debuginfo-4.4.23-31.54.amzn1.x86_64<br \/>\nkernel-headers-4.4.23-31.54.amzn1.x86_64<br \/>\nkernel-debuginfo-common-x86_64-4.4.23-31.54.amzn1.x86_64<\/p>\n<p>i686:<br \/>\nkernel-4.4.23-31.54.amzn1.i686<br \/>\nkernel-devel-4.4.23-31.54.amzn1.i686<br \/>\nkernel-tools-debuginfo-4.4.23-31.54.amzn1.i686<br \/>\nkernel-tools-devel-4.4.23-31.54.amzn1.i686<br \/>\nkernel-debuginfo-common-i686-4.4.23-31.54.amzn1.i686<br \/>\nperf-4.4.23-31.54.amzn1.i686<br \/>\nkernel-debuginfo-4.4.23-31.54.amzn1.i686<br \/>\nperf-debuginfo-4.4.23-31.54.amzn1.i686<br \/>\nkernel-tools-4.4.23-31.54.amzn1.i686<br \/>\nkernel-headers-4.4.23-31.54.amzn1.i686<\/p>\n<p>FIX:<\/p>\n<p>You can fix either by upgrading the patched kernel or remove all the packlages marked as rc by dpkg<\/p>\n<p># dpkg &#8211;list | grep &#8220;^rc&#8221; | cut -d &#8221; &#8221; -f 3 | xargs sudo dpkg &#8211;purge<\/p>\n<p>But UROLIME recommend upgrading the installed kernel version to the latest stable release. You might require a reboot of your server after the kernel upgrade.<\/p>\n<blockquote><p><strong>Red-Hat\/centOS<\/strong><br \/>\nyum update kernel<br \/>\n<strong>Ubuntu:<\/strong><br \/>\napt-get install linux-generic<br \/>\n<strong>Amazon:<\/strong><br \/>\nyum update kernel<\/p><\/blockquote>\n<p>Please find the below steps that we have used one of our Ubuntu server.<\/p>\n<blockquote><p>root@ip-172-31-3-253:~# uname -rv<br \/>\n3.13.0-92-generic #139-Ubuntu SMP Tue Jun 28 20:42:26 UTC 2016<br \/>\napt-get update<br \/>\napt-get install linux-generic<br \/>\nreboot<br \/>\nroot@ip-172-31-3-253:~# uname -rv<br \/>\n3.13.0-100-generic #147-Ubuntu SMP Tue Oct 18 16:48:51 UTC 2016<\/p><\/blockquote>\n<p><!--more--><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_194\" class=\"pvc_stats all  \" data-element-id=\"194\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Dirty COW [ CVE-2016-5195 ] COW -&gt; Copy &#8211; On &#8211; Write Dirty COW is actually an old vulnerability , which has driven back after 10 long years. The issue was first identified by Linus Torvalds and found some difficulties to patch the issue. The vulnerability is also called privilege-escalation vulnerability. In which the normal [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_194\" class=\"pvc_stats all  \" data-element-id=\"194\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-194","post","type-post","status-publish","format-standard","hentry","category-general"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Dirty COW - Vulnerability Fix - Urolime Blogs<\/title>\n<meta name=\"description\" content=\"Dirty Cow Vulnerability Fix\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dirty COW - Vulnerability Fix - Urolime Blogs\" \/>\n<meta property=\"og:description\" content=\"Dirty Cow Vulnerability Fix\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-28T17:44:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-31T13:19:47+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Dirty COW &#8211; Vulnerability Fix\",\"datePublished\":\"2016-10-28T17:44:53+00:00\",\"dateModified\":\"2016-10-31T13:19:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/\"},\"wordCount\":450,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg\",\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/\",\"name\":\"Dirty COW - Vulnerability Fix - Urolime Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg\",\"datePublished\":\"2016-10-28T17:44:53+00:00\",\"dateModified\":\"2016-10-31T13:19:47+00:00\",\"description\":\"Dirty Cow Vulnerability Fix\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched.jpg\",\"width\":760,\"height\":428,\"caption\":\"dirty cow the most dangerous linux bug patched\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/in\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Dirty COW &#8211; Vulnerability Fix\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Dirty COW - Vulnerability Fix - Urolime Blogs","description":"Dirty Cow Vulnerability Fix","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/","og_locale":"en_US","og_type":"article","og_title":"Dirty COW - Vulnerability Fix - Urolime Blogs","og_description":"Dirty Cow Vulnerability Fix","og_url":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/","og_site_name":"Urolime Blogs","article_published_time":"2016-10-28T17:44:53+00:00","article_modified_time":"2016-10-31T13:19:47+00:00","og_image":[{"url":"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg","type":"","width":"","height":""}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Dirty COW &#8211; Vulnerability Fix","datePublished":"2016-10-28T17:44:53+00:00","dateModified":"2016-10-31T13:19:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/"},"wordCount":450,"commentCount":0,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage"},"thumbnailUrl":"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg","articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/","url":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/","name":"Dirty COW - Vulnerability Fix - Urolime Blogs","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage"},"thumbnailUrl":"http:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched-300x169.jpg","datePublished":"2016-10-28T17:44:53+00:00","dateModified":"2016-10-31T13:19:47+00:00","description":"Dirty Cow Vulnerability Fix","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2016\/10\/dirty-cow-the-most-dangerous-linux-bug-patched.jpg","width":760,"height":428,"caption":"dirty cow the most dangerous linux bug patched"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/in\/dirty-cow-vulnerability-fix\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/in\/"},{"@type":"ListItem","position":2,"name":"Dirty COW &#8211; Vulnerability Fix"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/in\/#website","url":"https:\/\/www.urolime.com\/blogs\/in\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/in\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/in\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/in\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/in\/wp-content\/uploads\/sites\/9\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/in\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/in\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/comments?post=194"}],"version-history":[{"count":6,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/194\/revisions"}],"predecessor-version":[{"id":203,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/posts\/194\/revisions\/203"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/media?parent=194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/categories?post=194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/in\/wp-json\/wp\/v2\/tags?post=194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}