The computers and servers running on Linux and its various flavors are not as secure as people believed it to be. A recent analysis by Google’s engineers has shown a serious security flaw in the operating system which leaves all the Linux based at risk. In order to overcome the potential risks of this vulnerability, users should update their servers.
The security vulnerability was found in the GNU C Library’s DNS Client. This vulnerability is a potential security threat which allows remote code execution on the systems running Linux without the updates. Many Bitcoin applications and services run on Linux servers and if this security vulnerability is left unchecked by the system admins, it may potentially lead to huge losses.
Bitcoin industry has always been the target for hackers and other cybercriminals. The number of hacking incidents targeting bitcoin wallets, exchanges, and payment processors in the past stands proof of this. Hackers may take advantage of this new found vulnerability to gain access to the service and even siphon off bitcoin stored in the hot wallets.
According to a report on Slashdot’s Linux section, the vulnerability was found simultaneously by Google’s online security team and Red Hat security researchers. The flaw designated CVE-201507547 is categorized as a stack-based buffer overflow in the DNC Client of GNU C library. A security patch for this issue has been released for this security issue. In order to protect the system, admins and users can run a system update from their terminal and reboot the server for the changes to take effect.
It is always advisable to keep the systems updated with latest security updates and other features to ensure data integrity and security of the systems. Ignoring these issues may potentially turn out to be really expensive in case the systems are compromised by those looking to take advantage of these security flaws.