25 Oct A serious Linux kernel vulnerability (Dirty COW) was announced: learn how to patch without downtime!
- On October 19th 2016, a serious Linux kernel vulnerability named Dirty COW (CVE-2016-5195) was announced. This bug makes it possible for an unprivileged user to get write access to read-only memory mappings which lets them increase their privileges on the system.Checking the impact of this vulnerability, it’s really important to patch your Linux kernel ASAP. But is this possible on your production systems? Can you just plan some downtime and perform patching on all of the Linux servers?Probably it’s a whole job to ask the business for downtime, followed by preparing and patching the servers one by one. However, Oracle Enterprise Linux can help to get out the burden of those kind of security patches: using Ksplice, the patching can be done online without any downtime needed. Even better, with the autoinstall option enabled, it wouldn’t require any action at all, ending up with a Linux running the latest known security patches without any intervention from your side.Monin can help customers to configure and setup Ksplice on their Oracle Linux. Also customers running Red Hat Linux or Oracle Enterprise Linux without Ksplice installed we can help to install the latest security patches needed.
Just ask us for more information about how we can help you securing your Red Hat Linux or Oracle Enterprise Linux so it’s patched for the latest known security vulnerabilities. Contact us by phone: +32 3 450 67 89, via e-mail: firstname.lastname@example.org or by filling in the form on this page.
- More information about the Dirty COW vulnerability: https://access.redhat.com/security/vulnerabilities/2706661
- More information about Ksplice: http://ksplice.oracle.com/