Every month, the KernelCare team strives to help you never miss a critical patch. This September, we worked extremely hard to swiftly release CVE–2020-14386 patches for your Proxmox 5 & 6 and Ubuntu 16.04 as well as for newer versions. There are also several new useful guides and articles that can help boost the security of your servers in seconds. Sounds like something you can benefit from? Keep on reading for more details!
CVE-2020-14386 corrupts the memory in kernels newer than 4.6 on various Linux distributions. KernelCare promptly released new patches that you can use now to secure following Linux distributions:
- Ubuntu Bionic (18.04) and newer
- Debian 9 and 10
- CentOS 8/RHEL 8
Be the first one to know about fresh releases! Sign up for notifications about new KernelCare patches.
There is a new libraries scanner on the market: UChecker by KernelCare.
It is a free, open-source scanner that checks network Linux servers and detects out-of-date libraries both on disk and in memory. No more rebooting the whole server! Watch the video to see the UChecker in action.
More articles on our Blog
Explore KernelCare Blog to read even more useful guides:
- The Ultimate Guide to Updating Linux Kernel—Expands on why you should update your kernel even if it’s not broken. It will encourage you to step away from the popular false belief that updating kernels is a source of torture on Earth.
- The Ultimate Guide to Linux Patch Management—Covers every aspect of patch management. Think this topic is redundant for you at this point? We bet we can surprise you with the latest updates on manual and automated patching.
We prepared this article to highlight how false positives may affect your scanning process. They are the reason number one why Security Operations Centres are currently being deemed as unproductive by administrators who are tired of vulnerability scanners’ inefficiencies. Keep reading to learn four ways to decrease alert fatigue and analyst burnout.
In this article, KernelCare CEO Igor Seletskiy shares his view on modern cybersecurity and vulnerabilities in shared libraries. Read it for an overview of best practices on updating shared libraries and the logic behind live patching technologies.
Do you have something to say about the topic? Share your thoughts with the KernelCare team. We appreciate your input!
Do not forget to check out more KernelCare updates: