A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.
This could be abused by an attacker to modify existing setuid files with instructions to elevate privileges.
To prevent this exploit we need to patch the kernel for which we would require a reboot of the server.Please let us know when to schedule it
Friday, November 4, 2016