Skip to main content

Cleaning the Dirty COW – Emergency Patching in Satellite 6

By July 15, 2021No Comments

Cleaning the Dirty COW – Emergency Patching in Satellite 6

Many people ask us, ‘What do you mean by Integrated Security’? For us, it means thinking about security from Day 1, rather than an afterthought. As a part of a foundational element to an agile infrastructure, patch management is a crucial function. Rolling out infrastructure (whether on-prem, cloud, etc.) with a solid patch management strategy is part of integrated security.

In today’s short video, I’m going to demonstrate how to perform emergency patch management in Satellite 6. In specific, I will walk through patching an errata that was released by Red Hat to address a kernel vulnerability recently found called ‘Dirty Cow’.

Dirty COW … officially list as CVE-2016-5195 is a nasty kernel vulnerability. According to Red Hat


p>dirty cow

‘A race condition was found in the way Linux kernel’s memory subsystem handled breakage of the read only private mappings COW situation on write access. An unprivileged local user could use this flaw to gain write access to otherwise read only memory mappings and thus increase their privileges on the system.’ Patches have been now made available for most common Linux distributions, including all major supported RHEL releases. In the video below I will demonstrate patching a RHEL7 system using Satellite 6.

{% include video name=’M0fpmN0YmP8′

If you have any questions regarding the above please don’t hesitate to reach out!