A Linux bug threatens the safety of the users’ accounts who demand their data to be secured as soon as possible. Although companies like Linux promise to offer full protection to the data of their users, they became paranoid when they found out that a virus which first attacked Linux nine years ago is now free again. This mistake that happened a long time ago is still haunting Linux company. Its effects are still traceable in the system.
Phil Oester was the one who found out about the Linux bug and informed the media that this attack even if it will be abolished will come back again and again as it had previously happened. He also argued that the only way he was able to detect it was because he was tracing all HTTP inbound traffic, being able to extract the bug ant to test it.
This problem was assumed to be a Linux bug that goes back eleven years ago when Linus Torvalds has tried to analyze one. Unfortunately, someone has erased all the efforts of his work seven years later, and Oester’s theories and figures were restoring the peace since 2007.
The Linux bug called CVE-2016-5195 has appeared because of a disorder that occurred at the core of the memory system of Linux. This trouble takes place during specific read-only memory processes. Linux’s officials believe that a hacker managed to break the firewall and gained access to users’ data. These pieces of information which were only seen as read-only data until the breach in the system, they have become palpable files.
Linus Torvaldshas claimed that this race condition problem was not concrete until recent events happened. This matter can be traced with the help of VM technology. Experts from the company who preserved the core memory system of Linux have analyzed the Linux bug and decided to keep their eyes on it, bringing updates to Linux users.
This bug known as “Dirty COW” was classified by the Linux officials as a significant bug. Probably, users should take into account the advice of the specialists and should inspect their security systems right on the spot to protect their data. Oester has argued that a very efficient manner to secure your information is to try to trace the bug and patch it. Users should be aware of the danger and should try their best to keep them safe.
Image source: pixabay