KernelCare Blog

KernelCare Blog

by / Tuesday, 06 February 2018
KernelCare fixes Meltdown and Spectre without reboots!

KernelCare now live patches Meltdown and Spectre (spectre-v1) that exploit critical vulnerabilities in modern processors. The list of supported distributions is available below. Free trial supports updates too.

By now, you might have thought that the topic of Meltdown and Spectre vulnerabilities...

Continue reading

Topic: in KernelCare Blog


by / Thursday, 18 January 2018
CloudLinux CLN downtime Monday, January 22nd, starting at 1:00 am EST

We will be performing planned CLN hardware upgrade from 1:00 am EST (6:00 am GMT) to 4:00 am EST (9:00 am GMT) on Monday, January 22nd, 2018.

During that time you might experience issues with accessing CLN, registering new servers, converting servers to CloudLinux, registering new IP-based...

Continue reading

Topic: in CloudLinux OS Blog KernelCare Blog


by / Wednesday, 03 January 2018
Intel CPU Bug - Meltdown and Spectre - KernelCare and CloudLinux
Update [May 29, 2018 12:25am PT]

Meltdown fixes for Ubuntu 16.04 are now on test.

To deploy them:
edit /etc/sysconfig/kcare/kcare.conf

Add:
PREFIX=test

Run:
kcarectl --update

TAGNAME: update-2018-05-29-test-1

ubuntu-xenial:
  CVE-2017-5754: Systems with microprocessors utilizing speculative execution...

Continue reading

Topic: in CloudLinux OS Blog KernelCare Blog


by / Thursday, 07 December 2017
KernelCare crashes on CloudLinux 7 & CloudLinux 6 Hybrid

Updated: Dec 7, 2017, 8AM PT

Our previous patch provided the fix of ext4 bug with KernelCare included a bug in unpatch. The bug was triggered by latest patch, and caused some number of servers to crash. The effect of the bug is that servers that use ext4 will crash. If they didn't crash - they...

Continue reading

Topic: in KernelCare Blog


by / Tuesday, 14 November 2017
We are making better marketing materials - please help us prioritize with this SURVEY!

We at CloudLinux always try to gather actionable insights from the hosting community and our customers, in order to improve and expand our products, and to deliver better services to you. Today, we’d like to ask you to participate in our marketing survey.

We would appreciate feedback from our...

Continue reading

Topic: in CloudLinux OS Blog KernelCare Blog Imunify360 Blog


by / Monday, 16 October 2017
Updates for a blog post "The Symlink Protection patchset"

Please note that we have updated a blog post The Symlink Protection patchset.

We have eliminated errors and implemented changes. Now you can confidently use these instructions to get the patches.

We apologize for the inconveniences.

Continue reading

Topic: in KernelCare Blog


by / Wednesday, 04 October 2017
The Symlink Protection patchset is available for free for CentOS 6 & 7, even if you are not running KernelCare

A few weeks ago we released the KernelCare "Extra" Patchset with the security fixes and the symlink protection available to all KernelCare customers running CentOS kernels. Today we are pleased to share that you can get the Symlink Protection Patchset for CentOS 6 and 7 at no cost, even if you...

Continue reading

Topic: in KernelCare Blog


by / Wednesday, 13 September 2017
Pagely deployed KernelCare to improve server security and reduce downtime

REBOOT-BE-GONE WITH KERNELCARE & PAGELY!

We are excited to share that Pagely, the enterprise managed WordPress hosting provider, has deployed KernelCare for their WordPress hosted customers. KernelCare keeps Linux servers secure, allowing Pagely to apply the latest security patches to their...

Continue reading

Topic: in KernelCare Blog


by / Tuesday, 22 August 2017
The KernelCare "Extra" Patchset for CentOS 6 & 7 with symlink protection is here

The KernelCare extra patchset includes all the security fixes from KernelCare for CentOS 6 and CentOS 7, as well as the symlink protection against a symlink race.

A symlink race attack is often used against shared hosting servers. It allows a malicious user to serve files that belong to other...

Continue reading

Topic: in KernelCare Blog Imunify360 Blog


by / Thursday, 03 August 2017
New privilege escalation vulnerability found in Linux kernel

A race condition in Linux kernel was disclosed today, August 3rd, 2017 (see CVE-2017-7533). It can be exploited to allows an unprivileged local user to gain root access to the server. Currently, there is an existing working exploit allowing privileges escalation for 32 bit kernels. It is unclear...

Continue reading

Topic: in KernelCare Blog


1 2 3 4 5 6 7 8 9 10