Meltdown Spectre vulnerabilities and CPM

Meltdown/Spectre vulnerabilities and CPM

In order to fix the "Meltdown" vulnerability, please follow these instructions:

We have verified that as of now (April 12th 2018), this procedure will result in kernel 3.13.0-144-generic, which is patched against Meltdown and both Spectre (v1 and v2) vulnerabilities.
However, the instance may still be reported as vulnerable to Spectre v2 - we are investigating this issue with AWS, and will update this KB article as soon as we have more information.

    • Related Articles

    • CPM and "Dirty COW" Linux vulnerability

      In order to fix the "Dirty COW" vulnerability, please follow these instructions: https://support.n2ws.com/portal/kb/articles/how-to-update-the-ubuntu-distribution-on-the-cpm-instance
    • Apache Log4j2 vulnerability CVE-2021-44228

      Q: Does Apache Log4j2 vulnerability CVE-2021-44228 (https://nvd.nist.gov/vuln/detail/CVE-2021-44228) affect CPM? A: No, this vulnerability is not relevant to any version of CPM
    • CPM instance hardening for vulnerability scans

      In order to perform the below operations, you need to connect to the instance with SSH (your assigned private key and username: "cpmuser"). 1) (Only in v2.3 and up) To enforce usage of TLS 1.2, please edit the file /etc/apache2/mods-enabled/ssl.conf. ...
    • A clarification about the "debian-sys-maint" vulnerability reported by AWS Marketplace

      You may have received an email from the AWS Marketplace indicating a possible vulnerability in Cloud Protection Manager. The content of that email is included at the bottom of this article.   IMPORTANT: Your data was not breached and is not in any ...
    • Release notes for the latest v2.2.x CPM release

      The latest patch can be found at https://n2ws.com/wp-content/uploads/2018/02/2.2.0a_Upgrade_PATCH_20180218.zip (please unzip it before using) Upgrading to v2.2.x using patch is supported only from versions 2.1.3x and up. In order to upgrade from ...