KernelCare Blog

KernelCare Blog

by / Wednesday, 22 February 2017
Security warning: major vulnerability found in Linux kernels that affects most kernels

A new major local privilege escalation vulnerability in the Linux kernel was disclosed today by Andrey Konovalov (see CVE-2017-6074). It is a memory corruption vulnerability where the same memory location is freed by kernel twice. The vulnerability can be exploited to escalate privileges and...

Continue reading

Topic: in KernelCare Blog


by / Tuesday, 31 January 2017
The new CloudLinux and Imunify360 Forums have arrived

We are excited to announce the updated CloudLinux Forum 2.0 with the new Imunify360 section, just in time to get the conversation started! If you haven’t visited our forums for a while, check it out. This is the place for you to ask questions and get responses from the community as well as the...

Continue reading

Topic: in CloudLinux OS Blog KernelCare Blog Imunify360 Blog


by / Thursday, 08 December 2016
The KernelCare Update: The patch to fix CVE-2016-8655 exploit is here!

A new vulnerability CVE-2016-8655 in the Linux kernel was discovered yesterday by Philip Pettersson. It is a race-condition in Linux (net/packet/af_packet.c) that can be exploited to gain kernel code execution from unprivileged processes. This exploit may lead to a privilege escalation, cause a...

Continue reading

Topic: in KernelCare Blog


by / Monday, 28 November 2016
KernelCare is now available in Plesk

Live patching and better security is now available right inside Plesk’s extensions catalog! With KernelCare, Plesk users will no longer need to bring their servers down due to security patching. It installs in minutes with a single line of code and without a reboot, and allows companies get...

Continue reading

Topic: in KernelCare Blog


by / Tuesday, 15 November 2016
Managing KernelCare with Puppet

By guest author Christian Reiß

If you haven’t felt it before: when Dirty Cow hit you did. The Linux Kernel is rock solid, proven but also has security issues. In this case: Root rights for everyone! And on top of that this bug is so trivially easy to exploit (several proof-of-concepts are out...

Continue reading

Topic: in KernelCare Blog


by / Friday, 28 October 2016
Dirty Cow: visual patch release timeline
Linux distributions took Dirty Cow vulnerability seriously, releasing patches as quickly as possible. Some did better than others. Here, we’ve put together a visual chart of when major Linux distributions have released their patches, and when live patch technologies, like our own KernelCare...

Continue reading

Topic: in KernelCare Blog


by / Wednesday, 26 October 2016
How to fix Dirty COW without rebooting servers

Dirty Cow CVE-2016-5195 exploit is said to be the “Most serious” Linux privilege-escalation bug ever. Within a few days of its discovery, various Linux distributions have released patches to fix it, but to apply those, you need to reboot servers. You either need to cause downtime you...

Continue reading

Topic: in KernelCare Blog


by / Tuesday, 25 October 2016
Nonprofits can now live patch kernels for free

In light of the recent Dirty Cow exploit, said by experts to be the “Most serious” Linux privilege-escalation bug ever, we’ve decided to push forward our prior plans to offer KernelCare for free for nonprofit organizations so that they can protect themselves from critical vulnerabilities...

Continue reading

Topic: in KernelCare Blog


by / Monday, 24 October 2016
Live patching for your custom kernel

Do you want to use KernelCare for rebootless kernel updates? But what if you are running an unsupported distribution? What if your kernel is custom, self-compiled, special, or just old?

Look no further than KernelCare. It provides Custom Kernel Patching so that you can benefit from live patching...

Continue reading

Topic: in KernelCare Blog


by / Saturday, 22 October 2016
KernelCare, Dirty Cow, systemtap and CentOS/RHEL/CL 5 - Important!!!

The systemtap scripts recommended by RedHat https://bugzilla.redhat.com/show_bug.cgi?id=1384344#c13 and many other people as workaround against CVE-2016-5195 DirtyCow might be ineffective against new variations of the attack like this one:

Continue reading

Topic: in CloudLinux OS Blog KernelCare Blog


1 2 3 4 5 6 7 8