CloudLinux - bugfix - CloudLinux Blog
Blog
update_general
Теги:

Production: sudo-1.8.6p3-29.el6_9.cloudlinux with CVE-2019-14287 fix for CloudLinux OS 6 released

update_general
New updated sudo-1.8.6p3-29.el6_9.cloudlinux package for CloudLinux OS 6 is now available for download from our production repository. Changelog fixed CVE-2019-14287. You can find details here: https://www.sudo.ws/alerts/minus_1_uid.html Upgrade command yum upgrade sudo
  1871 просмотров
  0 Комментариев
update_general
Теги:

Production: sudo-1.8.23-4.el7.cloudlinux with CVE-2019-14287 fix for CloudLinux OS 7 released

update_general
New updated sudo-1.8.23-4.el7.cloudlinux package for CloudLinux OS 7 is now available for download from our production repository. Changelog fixed CVE-2019-14287. You can find details here: https://www.sudo.ws/alerts/minus_1_uid.html Upgrade command yum upgrade sudo
  2665 просмотров
  0 Комментариев
update_general
Теги:

Beta: sudo-1.8.6p3-29.el6_9.cloudlinux with CVE-2019-14287 fix for CloudLinux OS 6 released

update_general
New updated sudo-1.8.6p3-29.el6_9.cloudlinux package for CloudLinux OS 6 is now available for download from our updates-testing repository. Changelog fixed CVE-2019-14287. You can find details here: https://www.sudo.ws/alerts/minus_1_uid.html Upgrade command yum upgrade sudo --enablerepo=cloudlinux-updates-testing
  1974 просмотров
  0 Комментариев
update_general
Теги:

Beta: sudo-1.8.23-4.el7.cloudlinux with CVE-2019-14287 fix for CloudLinux OS 7 released

update_general
New updated sudo-1.8.23-4.el7.cloudlinux package for CloudLinux OS 7 is now available for download from our updates-testing repository. Changelog fixed CVE-2019-14287. You can find details here: https://www.sudo.ws/alerts/minus_1_uid.html Upgrade command yum upgrade sudo --enablerepo=cloudlinux-updates-testing
  2218 просмотров
  0 Комментариев
panic

Don’t panic about TCP SACK PANIC—we’re working on it

panic
Recently, TCP networking vulnerabilities have been discovered in FreeBSD and Linux kernels by Netflix. There are three flaws, one of them is rated by severity as Important (CVE-2019-11477), and two as Moderate (CVE-2019-11478 and CVE-2019-11479). What is the problem? The flaws use the Maximum Segment Size (MSS) and TCP Selective Acknowledgement (SA...
Продолжить чтение
Последние комментарии
Guest — Ryan Smith
KernelCare eta?
20.06.2019 16:15
Ivan Zhmud
Hello Ryan. It will be in 2-3 working days. Follow please for our updates https://www.kernelcare.com/blog/... Read More
20.06.2019 16:55
Guest — Paul Roche
Cloudlinux 7 Hybrid?
20.06.2019 19:10
  7770 просмотров
  5 Комментариев
mds3
Теги:

Let us subject MDS vulnerability to the glare of truth

mds3
Ok, let me throw a little light on the last release of the CloudLinux 7 and CloudLinux 6 kernel with the MDS vulnerability patch. MDS vulnerability explanation In the last three days, we’ve received a whole bunch of questions like Should I disable Hyper-Threading or not? and How Hyper-Threading disabling can impact performance? So, here we ar...
Продолжить чтение
Последние комментарии
Guest — Jeff
I'm confused by the microcode availability as the Intel chart doesn't match the list above. Intel's Guidance PDF shows many CPUs ... Read More
24.05.2019 20:52
Ivan Zhmud
Hello, Jeff! The table above should the same as the Intel's table in pdf. Just in our table is used classic cpuid and in PDF is us... Read More
24.05.2019 21:35
Guest — Jeff
Thanks. However, on multiple E3 and E5 cpus: Yum log shows May 16 02:23:26 Updated: 2:microcode_ctl-1.17-33.11.el6_10.x86_64 Ser... Read More
25.05.2019 19:54
  6408 просмотров
  5 Комментариев
MDS-fixed
Теги:

CloudLinux 6 kernel is available with a fix for MDS vulnerability

MDS-fixed
CloudLinux 6 kernel version 2.6.32-954.3.5.lve1.4.64 with a fix for MDS vulnerability is now available for download from our production repository. Changelog: CKSIX-218: x86 MDS mitigations::CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling;CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling;CVE-2018-12127 MLPDS Micro...
Продолжить чтение
Последние комментарии
Guest — Deyan
Hello, Can you please tell me why you do not suggest to install or upgrade microcode_ctl package with CL6 kernel, like you do wit... Read More
20.05.2019 22:56
Inessa Atmachian
Hello Deyan, Frankly speaking, we missed the microcode_ctl in our update command. Sorry for that — MDS vulnerability made too muc... Read More
21.05.2019 08:54
  7136 просмотров
  2 Комментариев
MDS-fixed

Beta: CloudLinux 6 kernel is available with a fix for MDS vulnerability

MDS-fixed
CloudLinux 6 kernel version 2.6.32-954.3.5.lve1.4.64 with a fix for MDS vulnerability is now available for download from our updates-testing repository. Changelog: CKSIX-218: x86 MDS mitigations:CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling;CVE-2018-12130 MFBDS Microarchitectural Fill Buffer Data Sampling;CVE-2018-12127 MLPDS M...
Продолжить чтение
Последние комментарии
Guest — Tro
Do you plan to provide patches for MDS over kernelcare? Thanks
16.05.2019 09:30
Guest — Alexandre
Yes, we are working now on building the KC patches for MDS
16.05.2019 10:11
  4748 просмотров
  2 Комментариев
MDS-fixed

Beta: СloudLinux 7 and CloudLinux 6 Hybrid kernel is available with a fix for MDS vulnerability

MDS-fixed
CloudLinux 7 and CloudLinux 6 Hybrid kernel version 3.10.0-962.3.2.lve1.5.25.8 with a fix for MDS vulnerability is now available for download from our updates-testing repository. Changelog: CLKRN-457: fix KABI breakage;CLKRN-458: x86 MDS mitigations:CVE-2018-12126 MSBDS Microarchitectural Store Buffer Data Sampling;CVE-2018-12130 MFBDS Microarchite...
Продолжить чтение
  4483 просмотров
  0 Комментариев
Service-Unavailable
Теги:

Unexpected issue caused by the latest alt-PHP update

Service-Unavailable
Updated 1:26 PM (PT), April 11, 2019 The fix for this package is released. See https://www.cloudlinux.com/cloudlinux-os-blog/entry/alt-php-updated-1-75. We’ve found an issue in the latest alt-PHP stable update — a package changes the /etc/cl.selector/symlinks.rules file. And this may cause unexpected behavior of the PHP Selector. How to...
Продолжить чтение
Последние комментарии
Guest — Ivan Levente
It would be better if you fix the initial update itself, or better yet issue a new update that fixes the previously broken things.... Read More
11.04.2019 12:08
Darya Malyavkina
Hello Ivan! The fix will be available in a few hours. But if you do not want to wait, you can do the actions described in the pos... Read More
11.04.2019 12:27
Guest — Steve
What does this mean: "Restore the same etc/cl.selector/symlinks.rules file from the backup" Makes no sense to me?... Read More
11.04.2019 12:50
  5186 просмотров
  13 Комментариев

EU e-Privacy Directive

This website uses cookies to ensure you get the best experience using our website and services. If you prefer we don’t use cookies, please disable them in your browser.

You have declined cookies. This decision can be reversed.

You have allowed cookies to be placed on your computer. This decision can be reversed.