CloudLinux - CloudLinux Blog - KernelCare CVE-2014-9322 patch

KernelCare CVE-2014-9322 patch

Update: The patch has been released on Dec 18, 2014 at 1pm ET. You can read more about it here:

We have received numerous requests for CVE-2014-9322 patch. Right now we are running burn in tests that should finish in a few hours. This patch was the most complex patch so far. It was in assembler code, while most patches are in C, and it was altering how interrupt handlers work. It is highly unusual, and there were no such security patches in the past 3 years. We had to add special handing to our patch generation software to accommodate for that, and it took as significant amount of time to get there. While we started more then 24 hours before (4 days ago) any vendors released updated kernels, it is only now that we have a working patch. From now on we should be able to handle such patches with ease.

If you want to test the patch now, please, run (there is a slight chance of crash, as it burn in tests are yet to finish):
$ kcarectl --update --test

Or wait -- and within next 2-6 hours your system should get updated.

KernelCare local privilege escalation patch for PC...
KernelCare support for Debian 7 added

By accepting you will be accessing a service provided by a third-party external to

EU e-Privacy Directive

This website uses cookies to ensure you get the best experience using our website and services. If you prefer we don’t use cookies, please disable them in your browser.

You have declined cookies. This decision can be reversed.

You have allowed cookies to be placed on your computer. This decision can be reversed.