To operate servers securely, it’s not enough to patch their Linux kernels. Their shared software libraries must be patched as well. Otherwise, an enterprise lays itself open to attacks that exploit vulnerabilities such as Heartbleed or GHOST.
The usual way that enterprises deal with library vulnerabilities is by rebooting their servers. Admins rarely know exact libraries that services were using, so they just reboot the whole server to update them all. These reboots, however, bring serious problems:
In case servers have been patched manually, without a reboot, shared libraries may still contain vulnerabilities. When libraries are updated on disk, old unpatched files can persist in a server’s memory. Also, vulnerability scanners don’t detect these old unpatched library files in memory.
KernelCare+ patches shared libraries without rebooting.
The package includes:
Dell and 1,500+ Enterprise companies
© 2020 ALL RIGHTS RESERVED. CLOUDLINUX INC.