The KernelCare team are following developments for a recently-reported vulnerability involving QEMU-KVM guests running Linux kernels.
As you may know, KernelCare have been live patching Linux kernels on Arm architectures for a while now. But we’re not done spreading the word about live patching Arm-based equipment. To further share our expertise in rebootless Linux kernel updates, we are attending the Arm TechCon 2019, in San Jose, on October 8 - 10, 2019, at the San Jose Convention Center.
KernelCare patches will start rolling out on Monday, 12 August.
A new month has started—Summer is in full swing—Must be time for another CPU vulnerability. (Let’s hope this one has a catchy name.)
Netflix has a new hit on its hands. They’ve discovered new Linux kernel vulnerabilities and describe how a properly formed TCP network packet can cause the kernel to panic or slow down. There are three kinds. Two affect Linux kernels. (The other is for FreeBSD so won’t be described further.) All are dangerous because they can be executed remotely.
If anyone tells you that they know how to secure linux, but they fail to mention live patching – don’t listen to them. Keeping servers automatically up to date is key to keeping them safe. In the complex security question of how to secure Linux, patching live, in real-time, is the missing link.
You've just installed a kernel update, and now you need to carry out a Linux reboot. Except guess what? You don’t. Word is only just starting to get out, but times have changed, and rebooting is a thing of the past. This is a very positive development: because rebooting to patch is a hassle, companies frequently delay it for as long as they can – with damaging consequences.
A Linux kernel update is not to be taken lightly—change means risk. Whatever reasons you think you might have, there is really only one that matters. Igor Seletskiy, CEO of CloudLinux, tells you what it is in this blog post.
Linux kernel updates are a fact of life–as dull as taxes and only slightly less inconvenient than death. Newly discovered security vulnerabilities in the Linux kernel seem to appear with monotonous regularity. In most but not all cases, the patches needed to fix them follow swiftly after. There is work involved in installing the latest Linux kernel security patches, and danger if you delay–leave it too long and threat actors might take advantage of the period of vulnerability.
VMware has been a part of my working life for some time now. As a former Linux System Administrator, I've used it many times in different places. It's been one of my favorite ways to try out new operating systems (read: distro hopping) without having to buy more hardware.