August 2021 - TuxCare

Monthly TuxCare Update – August 2021

Here at TuxCare, we pride ourselves on being the trusted provider of maintenance services for the Enterprise Linux industry. Our services improve system administration manageability while maximising system uptime and minimising service disruption.

In this latest monthly overview, you will find a round-up of the latest CVEs patched by the TuxCare Team. Also, carry on reading for details of the latest updates to our range of TuxCare services, along with plenty of helpful advice.

Continue reading “Monthly TuxCare Update – August 2021”

Announcing the launch of Extended Lifecycle Support for CentOS 8

The TuxCare Team is proud to announce that it is adding support for CentOS 8 under its Extended Lifecycle Support service. With this service, TuxCare will provide patches for critical system components, like the Linux Kernel and shared libraries like OpenSSL, glibc, as well as many others, including most userspace utilities for CentOS 8 systems. Our service also comes with first-class 24/7 support and assistance. Coverage of CentOS 8 systems will be uninterrupted from the minute the distribution enters End-of-Life.

Continue reading “Announcing the launch of Extended Lifecycle Support for CentOS 8”

What is binary compatibility, and what does it mean for Linux distributions?

Binary compatibility is one of those important tech concepts that hides in the background – but that is a critical element in making things work. For Linux developers, in particular, binary compatibility is a major question given the number of different Linux distributions out there.

In this article, we take a closer look at what binary compatibility is, including the different contexts of binary compatibility. We also take a close look at what binary compatibility means for Linux distributions in particular.

Continue reading “What is binary compatibility, and what does it mean for Linux distributions?”

Tips for TuxCare’s KernelCare Enterprise integration with Qualys

Qualys provides visibility into the IT infrastructure, with comprehensive reporting on the state of systems and vulnerabilities that may be present in them.

TuxCare’s KernelCare Enterprise provides Live Patching for the Linux Kernel and important shared libraries like OpenSSL and glibc (functionality provided with LibraryCare Add-on).

It is possible to integrate KernelCare specific information into Qualys reports having the best of both worlds and accurately reflect the patched state of running kernels. This article shows you how to achieve this.

Continue reading “Tips for TuxCare’s KernelCare Enterprise integration with Qualys”

CentOS 6 ELS: squid34 package with the fix for several CVEs gradual rollout

A new updated squid34 package with the fix for several CVEs within CentOS 6 ELS has been scheduled for gradual rollout from our production repository.

Continue reading “CentOS 6 ELS: squid34 package with the fix for several CVEs gradual rollout”

CentOS 6 ELS: squid package has been scheduled for gradual rollout

A new updated squid package with the fix for the CVE-2020-14058 and CVE-2020-15049 within CentOS 6 ELS has been scheduled for gradual rollout from our production repository.

Continue reading “CentOS 6 ELS: squid package has been scheduled for gradual rollout”

OracleLinux 6 ELS: squid package with the fix for the CVE-2020-14058 and CVE-2020-15049 released

A new updated squid package with the fix for the CVE-2020-14058 and CVE-2020-15049 within OracleLinux OS 6 ELS is now available for download from our production repository.

Continue reading “OracleLinux 6 ELS: squid package with the fix for the CVE-2020-14058 and CVE-2020-15049 released”

Important OpenSSL vulnerabilities fixed by TuxCare CVE-2021-3711/3712

Few libraries are in widespread use as OpenSSL. It has a ubiquitous presence across hardware platforms and operating systems, userland applications and IoT. The chances are good that the web browser you are using right now to read this page is relying in some way on OpenSSL to negotiate the “s” in the “https” with the webserver.

Together with curl, zlib and glibc, it’s one of the names that make sysadmins tremble whenever they appear in the same sentence as “new vulnerabilities found”. Unfortunately, today is another of those days. Two new vulnerabilities have emerged for OpenSSL; one is considered “High” severity and the other “Low” severity. They affect all OpenSSL 1.1.1 versions, as well as the current beta/alpha versions of 3.0.0, but the final version of that series will include the fixes.

TuxCare’s Live Patching service has already prepared patches which are already being delivered – in the same day the vulnerabilities were announced – for EL8 based distributions, as well as Debian 10, Ubuntu 18.04 and 20.04 – the ones shipping the affected versions of OpenSSL.

 

Continue reading “Important OpenSSL vulnerabilities fixed by TuxCare CVE-2021-3711/3712”

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching