ClickCease Monthly KernelCare Update - September 2020 - TuxCare

Join Our Popular Newsletter

Join 4,500+ Linux & Open Source Professionals!

2x a month. No spam.

Monthly KernelCare Update – September 2020

September 29, 2020 - TuxCare PR Team

KernelCare September Monthly Update

Every month, the KernelCare team strives to help you never miss a critical patch. This September, we worked extremely hard to swiftly release CVE2020-14386 patches for your Proxmox 5 & 6 and Ubuntu 16.04 as well as for newer versions. There are also several new useful guides and articles that can help boost the security of  your servers in seconds. Sounds like something you can benefit from? Keep on reading for more details!

New vulnerability CVE-2020-14386 is identified! Patch it with KernelCare without reboot.

CVE-2020-14386 corrupts the memory in kernels newer than 4.6 on various Linux distributions. KernelCare promptly released new patches that you can use now to secure following Linux distributions:

  • Ubuntu Bionic (18.04) and newer
  • Debian 9 and 10
  • CentOS 8/RHEL 8

Be the first one to know about fresh releases! Sign up for notifications about new KernelCare patches.

Get a FREE 7-Day Supported Trial of KernelCare 

 

 

UChecker by KernelCare

There is a new libraries scanner on the market: UChecker by KernelCare.

It is a free, open-source scanner that checks network Linux servers and detects out-of-date libraries both on disk and in memory. No more rebooting the whole server! Watch the video to see the UChecker in action.

 

More articles on our Blog

Explore KernelCare Blog to read even more useful guides:

  • The Ultimate Guide to Updating Linux Kernel—Expands on why you should update your kernel even if it’s not broken. It will encourage you to step away from the popular false belief that updating kernels is a source of torture on Earth.
  • The Ultimate Guide to Linux Patch Management—Covers every aspect of patch management. Think this topic is redundant for you at this point? We bet we can surprise you with the latest updates on manual and automated patching.

Vulnerability Scan Reports: Are You Tired of Marking False Positives? 

We prepared this article to highlight how false positives may affect your scanning process. They are the reason number one why Security Operations Centres are currently being deemed as unproductive by administrators who are tired of vulnerability scanners’ inefficiencies. Keep reading to learn four ways to decrease alert fatigue and analyst burnout.

 

New Article by KernelCare CEO for Forbes Technology Council

KernelCare CEO Igor Seletskiy for Forbes

In this article, KernelCare CEO Igor Seletskiy shares his view on modern cybersecurity and vulnerabilities in shared libraries. Read it for an overview of best practices on updating shared libraries and the logic behind live patching technologies.

Do you have something to say about the topic? Share your thoughts with the KernelCare team. We appreciate your input! 

 

Do not forget to check out more KernelCare updates:

Monthly KernelCare Update – May 2020

Monthly KernelCare Update – June 2020

Monthly KernelCare Update – July 2020

Monthly KernelCare Update – August 2020

Monthly KernelCare Update – October 2020

Looking to automate vulnerability patching without kernel reboots, system downtime, or scheduled maintenance windows?

Learn About Live Patching with TuxCare

Become a TuxCare Guest Writer

Get started

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter