To start securely and efficiently, Linux systems follow a carefully orchestrated sequence of steps to initialize firmware and manage services. Applying security patches to the software responsible for some of these early steps of Linux startup often requires a full system reboot. Frequent reboots driven by unplanned critical patching is disruptive and man-power intensive, especially in high availability environments and for organizations that pride themselves in the number of 9’s in their uptime averages. Livepatch is Canonical’s solution to cut through this inefficiency in a way that shrinks vulnerability exploit windows and reduces unplanned strain on system administrators. Canonical Livepatch provides live kernel patches that are built and tested with the same machinery and rigor as the factory-installed kernel. Whether you’re running a single server or a high-availability cluster, Livepatch ensures your systems stay protected against critical and high CVEs, and the unplanned interruptions associated with remediating them. Let’s explore how Livepatch works and why it’s a game-changer for Linux security.
Get started with Ubuntu Pro and Livepatch, and secure your Linux workloads.
When booting up a Linux machine, a series of processes must successfully complete for the machine to be ready.
All security patches can be installed using security patching automations, some require services to be restarted, and others require a complete reboot to be fully applied. Even though glibc can be security patched without having to recompile systemd, glibc security updates require a system reboot. This is because packages like systemd which are run using a vulnerable version of glibc could potentially be exploited. Any security patches for glibc, libc, CPU microcode, the GRUB bootloader, and security vulnerabilities in the Linux kernel rated medium and below all require an upgrade and a reboot to apply. The needrestart package can be configured to auto-restart services when possible, to ensure the security patches are applied when Landscape, unattended-upgrades, or manually triggered apt upgrades are applied.
In contrast, critical and high security vulnerabilities in the Linux kernel do not require a system reboot.
Livepatch is a security patching automation solution for the Linux kernel, designed to secure your Ubuntu instances against critical or high Common Vulnerabilities and Exploits (CVEs), until the next security patching and reboot window. Livepatch eliminates the need for a reboot, and it achieves this in 2 ways:
Without Livepatch, in the event of a critical CVE, system administrators have to prepare environments for a reboot event. For high availability (HA) deployments, this means demoting a machine from the HA cluster, installing the update and applying it with a reboot, and promoting the machine back into the HA cluster. The HA cluster is vulnerable to exploits for the entire time it takes the system administrator to complete this security patching task.
Livepatch eliminates unplanned security patching related reboots. Livepatch applies available critical and high security patches as soon as Livepatch Client downloads the update, before any manual security patching intervention occurs. System administrators that want granular control over when Livepatch downloads and applies these patches have the ability to specify patching cut-off times, and also patching delays.
Shrink your security vulnerability exposure window exponentially with Livepatch, without sacrificing any 9’s in your uptime records. Livepatch is available with all free and paid Ubuntu Pro subscriptions. Learn more about Canonical’s release cadence and how it should influence your security patching maintenance calendar:
Learn more
For many software teams, documentation is written after features are built and design decisions have…
With the release of the FIPS 140-3 certified cryptographic modules for Ubuntu 22.04 LTS, Canonical…
Open source libraries are repositories of code that developers can use and, depending on the…
Last year, we had the opportunity to speak at Regent’s UX Conference (Regent’s University London’s…
A government agency mandated smartcard authentication across their Ubuntu fleet. When they enabled FIPS mode…
Building telco clouds with open source At MWC Barcelona 2026, Canonical is demonstrating how telecommunications…