All TurnKey Servers potentially vulnerable to Dirty COW (CVE-2016-5195) and other news

SECURITY ALERT

All current version of TurnKey Linux are potentially vulnerable to CVE-2016-5195, a kernel privilege escalation bug tagged "Dirty COW".

TurnKey versions 13.x and 14.x should have already auto installed the updated kernel, however users need to manually reboot their servers for the patched kernel to be applied.

Users of earlier versions of TurnKey (i.e. v11.x & v12.x) are strongly urged to upgrade their systems to a supported version of TurnKey ASAP.

https://www.turnkeylinux.org/blog/dirty-cow-kernel-privilege-escalation-...

In other news:

All your computers are belong to us: the dystopian future of security is now

https://www.turnkeylinux.org/blog/all-your-computers-are-belong-to-us

Reflections on PWN2Own 2016: the state and future of computer security

https://www.turnkeylinux.org/blog/pwn2own-2016-state-of-computer-security

ZeroNet and IPFS: uncensorable auto-scaling BitTorrent powered websites

https://www.turnkeylinux.org/blog/p2p-web-hosting

Heroku is dead – no-one uses it anymore. You need to use Docker now

https://www.turnkeylinux.org/blog/you-need-to-use-docker

Comparing Debian vs Alpine for container & Docker apps

https://www.turnkeylinux.org/blog/alpine-vs-debian

Cheers,
Jeremy Davis
TurnKey GNU/Linux
Cell: +61 497-084-807
PGP fingerprint: 6EAF 8CC7 9E00 2BA5 CE5B 4580 6D0C A24B 0C5C C21B