Meltdown/Spectre vulnerabilities and CPM
In order to fix the "Meltdown" vulnerability, please follow these instructions:
We have verified that as of now (April 12th 2018), this procedure will result in kernel 3.13.0-144-generic, which is patched against Meltdown and both Spectre (v1 and v2) vulnerabilities.
However, the instance may still be reported as vulnerable to Spectre v2 - we are investigating this issue with AWS, and will update this KB article as soon as we have more information.
Related Articles
CPM and "Dirty COW" Linux vulnerability
In order to fix the "Dirty COW" vulnerability, please follow these instructions: https://support.n2ws.com/portal/kb/articles/how-to-update-the-ubuntu-distribution-on-the-cpm-instance
Apache Log4j2 vulnerability CVE-2021-44228
Q: Does Apache Log4j2 vulnerability CVE-2021-44228 (https://nvd.nist.gov/vuln/detail/CVE-2021-44228) affect CPM? A: No, this vulnerability is not relevant to any version of CPM
CPM instance hardening for vulnerability scans
In order to perform the below operations, you need to connect to the instance with SSH (your assigned private key and username: "cpmuser"). 1) (Only in v2.3 and up) To enforce usage of TLS 1.2, please edit the file /etc/apache2/mods-enabled/ssl.conf. ...
A clarification about the "debian-sys-maint" vulnerability reported by AWS Marketplace
You may have received an email from the AWS Marketplace indicating a possible vulnerability in Cloud Protection Manager. The content of that email is included at the bottom of this article. IMPORTANT: Your data was not breached and is not in any ...
Release notes for the latest v2.2.x CPM release
The latest patch can be found at https://n2ws.com/wp-content/uploads/2018/02/2.2.0a_Upgrade_PATCH_20180218.zip (please unzip it before using) Upgrading to v2.2.x using patch is supported only from versions 2.1.3x and up. In order to upgrade from ...