

<?xml version="1.0" encoding="UTF-8"?>
	<rss version="2.0"
		xmlns:content="http://purl.org/rss/1.0/modules/content/"
		xmlns:wfw="http://wellformedweb.org/CommentAPI/"
		xmlns:dc="http://purl.org/dc/elements/1.1/"
		xmlns:atom="http://www.w3.org/2005/Atom"

			>

	<channel>
		<title>LexiConn News  &#187;  Topic: Dirty Cow Linux vulnerability patched for all servers</title>
		<atom:link href="https://support.lexiconn.com/news/forums/topic/dirty-cow-linux-vulnerability-patched-for-all-servers/feed" rel="self" type="application/rss+xml" />
		<link>https://support.lexiconn.com/news/forums/topic/dirty-cow-linux-vulnerability-patched-for-all-servers/feed</link>
		<description></description>
		<pubDate>Sun, 05 Apr 2026 18:35:00 +0000</pubDate>
		<generator>http://bbpress.org/?v=2.5.3-5249</generator>
		<language>en-US</language>

		
														
					
				<item>
					<guid>https://support.lexiconn.com/news/forums/topic/dirty-cow-linux-vulnerability-patched-for-all-servers/#post-49291</guid>
					<title><![CDATA[Dirty Cow Linux vulnerability patched for all servers]]></title>
					<link>https://support.lexiconn.com/news/forums/topic/dirty-cow-linux-vulnerability-patched-for-all-servers/#post-49291</link>
					<pubDate>Tue, 25 Oct 2016 23:19:05 +0000</pubDate>
					<dc:creator>lexiconn</dc:creator>

					<description>
						<![CDATA[
						<p>The latest Linux vulnerability named &#8220;Dirty Cow&#8221; has been patched on all of our servers. The patch was applied on Monday October 24th via Ksplice, a reboot-less kernel patching service we use on our servers. All hosted clients are safe from this vulnerability.</p>
<p>- LexiConn Support</p>
<p>&nbsp;</p>
						]]>
					</description>

					
					
				</item>

					
		
	</channel>
	</rss>

