Toggle navigation Home Store Browse All ----- Webhosting Domains Quotation (Webdesign Services) eMail Hosting SEO- Search Engine Optimisation GRAPHIC DESIGN Dedicated/ VPS Webhosting BULKSMS Mobi Applications Website Maintenance Register a New Domain Transfer Domains to Us Announcements Knowledgebase Network Status Affiliates Contact Us Account Login Register ----- Forgot Password? Categories 9 CGI Scripts 34 Databases 28 Dedicated Servers 1 DNS 15 Domains 5 eCommerce 79 eMails 27 FTP 1 General Issues 1 MX Records 1 Nameservers 28 Other 104 Scripting 254 Web Hosting Control Panel 9 Web Resources 8 Web Stats & Logs 11 Web Tools 8 Website Help and Diagnostics 4 Windows Hosting Categories CGI Scripts (9) Databases (34) Dedicated Servers (28) DNS (1) Domains (15) eCommerce (5) eMails (79) FTP (27) General Issues (1) MX Records (1) Nameservers (1) Other (28) Scripting (104) Web Hosting Control Panel (254) Web Resources (9) Web Stats & Logs (8) Web Tools (11) Website Help and Diagnostics (8) Windows Hosting (4) [LNX2.07] How can I protect my server from the Linux kernel vulnerability that affected servers at the end of 2009? As you may have read, a vulnerability has recently been identified in all versions of Linux which can lead to malicious users gaining full ("root") access to the affected machine in certain circumstances. This is a highly critical vulnerability as it affects the Linux kernel (the core part of the operating system).The Red Hat bug report for this issue can be read here.Unfortunately this may affect the CentOS version of Linux that you are running on your dedicated server.Here temporary solution you can put in place which we strongly recommend all customers implement.Solution Connect to your server using SSH. A free SSH client is available for Windows called PuTTY. You should connect to the IP address of your server as displayed in the Manage Dedicated Servers area. Make sure you are logged in as the root user. Run the following commands: echo "install pppox /bin/true" >> /etc/modprobe.conf echo "install bluetooth /bin/true" >> /etc/modprobe.conf rmmod pppox rmmod bluetooth If you see any warnings indicating the modules are in use, you should reboot your server to ensure they are unloaded. shutdown -r nowThis fix prevents the vulnerable components of the Linux kernel from being loaded. If you have any difficulties performing the above instructions, please don't hesitate to contact technical support. Was this answer helpful? Yes No Print this Article Also Read [LNX2.04] Where can I find documentation for MySQL? The support site and documentation are available from:www.mysql.com/support [LNX2.03] Where can I find documentation for Ubuntu? The support site and documentation are available from:https://help.ubuntu.com/ [LNX2.06] I have a dedicated server with RAID, but I can only see one disk. All our servers have RAID mirroring configured at the BIOS level, this means that the operating... [LNX2.01] I cannot connect to my server. There is no response when I try to connect. First you should try pinging your server. You can do this via the ‘Manage Dedicated Servers’... [LNX2.02] I have just ordered a Dedicated Server how long do I need to wait until I can use it? After you have ordered, our system automatically installs your operating system of choice on a... Support My Support Tickets Announcements Knowledgebase Downloads Network Status Open Ticket × Close Title Loading...