ClickCease New KernelCare+ patches Linux libraries and kernels - TuxCare
TuxCare Blog News

New KernelCare+ patches Linux libraries and kernels

January 24, 2020

KC+-min

You want more—more protection for business-critical applications running on Linux, applications that depend on glibc and OpenSSL.

As with the kernel, vulnerabilities in glibc or OpenSSL can’t wait to be patched.

That’s why, last November, we announced KernelCare+, an enhanced variant of KernelCare, one that patches vulnerabilities in essential user space libraries in addition to those in the Linux kernel. And as with KernelCare’s Linux kernel live patching, KernelCare+ updates applications without affecting their operational state—no restarts, no reboots.

Glibc and OpenSSL are critical libraries used by almost all popular applications running on Linux.

  • The GNU C Library, commonly known as glibc, is the most popular implementation of the standard C library. Many Linux applications and the Linux kernel itself are written in C.
  • OpenSSL is the library responsible for security between networked applications and operating systems. It performs network encryption and is the ‘S’ in the ‘HTTPS’ protocol used to serve secure web pages.

When a software vulnerability is discovered in either of these libraries, it can affect any number of dependent applications, applications that you’d rather not restart (databases and web servers, for example).

KernelCare+ extends to applications the same philosophy that protects Linux kernels.

KernelCare’s live patching experience now brings you non-impact vulnerability patching for glibc and OpenSSL, keeping applications safe without interrupting their processing or information states. That’s the added power of KernelCare+, which will be available for beta testing in May 2020.

This important new addition to the CloudLinux product line-up means you can get closer to the dream of always-compliant servers that never need downtime.

We haven’t forgotten an important enabling factor in this dream: the need to automate. That’s why KernelCare+ also brings integrations with major automation tools Ansible, Chef, and Puppet, and vulnerability scanning and reporting tools Nessus, Qualys and Rapid7.

KernelCare+ has two simple monthly pricing bands:

  • $5.95 per server for 0 to 500 servers
  • $3.95 for 500 or more servers

Remember, this is KernelCare+, so in addition to user space patching of critical vulnerabilities in glibc and OpenSSL, you also get Linux kernel vulnerability patching. Unpatched vulnerabilities in any software, user or kernel space, are a major cause of data leaks and hacker infiltration.

Get a FREE 7-Day Supported Trial of KernelCare 

 

If you want more integrations, more support and more control – check out KernelCare Enterprise subscription specifically tailored for large Enterprise companies.

Related post: KernelCare+ Now Available In Beta For Selected Distributions

TuxCare can help you reduce your risk window to data exfiltration and other cyber security threats.

TALK TO A CYBERSECURITY EXPERT

Expert knowledge of Linux security tips,
live patching education, and Cybersecurity news.

Stay updated with the latest news and announcements from TuxCare.com

Related Articles

The Bugs Behind the Vulnerabilities...

We continue to look at the code issues that cause...

November 14, 2022

Cybersecurity insurance and fine print:...

Catastrophic risks such as natural disasters and indeed cyberattacks require...

June 29, 2022

IT Automation With Live...

In a symphony orchestra, instruments harmonize to create one pleasing...

June 20, 2022

KernelCare ePortal updated – version...

We are pleased to announce that a new updated ePortal version...

June 16, 2022

KernelCare agent update – version...

We are pleased to announce that a new updated KernelCare agent...

June 2, 2022

KernelCare ePortal updated – version...

We are pleased to announce that a new updated ePortal version...

May 26, 2022

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching