Meltdown/Spectre vulnerabilities and CPM
In order to fix the "Meltdown" vulnerability, please follow these instructions:
We have verified that as of now (April 12th 2018), this procedure will result in kernel 3.13.0-144-generic, which is patched against Meltdown and both Spectre (v1 and v2) vulnerabilities.
However, the instance may still be reported as vulnerable to Spectre v2 - we are investigating this issue with AWS, and will update this KB article as soon as we have more information.
Related Articles
Apache Log4j2 vulnerability CVE-2021-44228
Q: Does Apache Log4j2 vulnerability CVE-2021-44228 (https://nvd.nist.gov/vuln/detail/CVE-2021-44228) affect CPM? A: No, this vulnerability is not relevant to any version of CPM
CPM and "Dirty COW" Linux vulnerability
In order to fix the "Dirty COW" vulnerability, please follow these instructions: https://support.n2ws.com/portal/kb/articles/how-to-update-the-ubuntu-distribution-on-the-cpm-instance
CPM instance hardening for vulnerability scans
In order to perform the below operations, you need to connect to the instance with SSH (your assigned private key and username: "cpmuser"). 1) (Only in v2.3 and up) To enforce usage of TLS 1.2, please edit the file /etc/apache2/mods-enabled/ssl.conf. ...
A clarification about the "debian-sys-maint" vulnerability reported by AWS Marketplace
You may have received an email from the AWS Marketplace indicating a possible vulnerability in Cloud Protection Manager. The content of that email is included at the bottom of this article. IMPORTANT: Your data was not breached and is not in any ...
Release notes for the latest v2.2.x CPM release
The latest patch can be found at https://n2ws.com/wp-content/uploads/2018/02/2.2.0a_Upgrade_PATCH_20180218.zip (please unzip it before using) Upgrading to v2.2.x using patch is supported only from versions 2.1.3x and up. In order to upgrade from ...