CVE-2016-5195/Dirty COW and Ksplice

Last week a serious Linux kernel vulnerability, CVE-2016-5195, nicknamed Dirty COW was announced.  This was a longstanding bug and affected most kernels that are running and was actively being exploited to escalate privileges on real Linux systems.  As soon as the bug was disclosed and the patch was released, the Ksplice team were quickly building and testing zero-downtime updates for over 5,000 supported kernels, in many cases making the fix available as a Ksplice update before a new kernel was released by the OS vendor.  For critical bugs like Dirty COW, Ksplice is not only the easiest way to apply security fixes - Ksplice with autoinstall enabled wouldn't have required any action at all - but it can also be the quickest, releasing fixes before the vendor has even released a new kernel.

With Ksplice you have the peace of mind of receiving quick, reliable fixes for all important security bugs on all of your systems, including kernels over 8 years old, without any disruption and without any action required.  Why not try Ksplice yourself for 30 days on Oracle Linux or RHEL and see how you can avoid disruptive, expensive downtime and stay secure?

Comments:

Post a Comment:
  • HTML Syntax: NOT allowed
About

Tired of rebooting to update systems? So are we -- which is why we invented Ksplice, technology that lets you update the Linux kernel without rebooting. It's currently available as part of Oracle Linux Premier Support, Fedora, and Ubuntu desktop. This blog is our place to ramble about technical topics that we (and hopefully you) think are interesting.

Search


Archives
« February 2017
SunMonTueWedThuFriSat
   
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
    
       
Today