Kernel does not support the prevention of symlink ownership attacks.

PCZero

Well-Known Member
Dec 13, 2003
780
103
193
Earth
BTW here are the results of the commands requested in the earlier thread...



root@myhost [~]# uname -r
2.6.32-696.el6.x86_64

root@myhost [~]# rpm -qa|grep kernel
abrt-addon-kerneloops-2.0.8-43.el6.centos.x86_64
kernel-headers-2.6.32-696.el6.x86_64
libreport-plugin-kerneloops-2.0.9-33.el6.centos.x86_64
dracut-kernel-004-409.el6_8.2.noarch
kernel-2.6.32-696.el6.x86_64
kernel-2.6.32-642.15.1.199.cpanel6.x86_64
kernel-firmware-2.6.32-696.el6.noarch

root@myhost [~]#
 

cPanelMichael

Administrator
Staff member
Apr 11, 2011
47,880
2,267
463
Hello,

To clarify, were you using the cPanel hardened kernel? If so, it's by design that it's replaced with newer stock kernels as this ensures critical CVEs are addressed. It will update back to the cPanel hardened kernel once we've published the updated version. We're looking into replacing the cPanel hardened kernel with a different kernel solution that will avoid this issue, but there's no additional information to report on that at this time.

Thank you.
 

PCZero

Well-Known Member
Dec 13, 2003
780
103
193
Earth
Yes under the previous issue/fix the cpanel hardened kernel resolved the issue. So now I am at risk until a new resolution is reacehed is what you are telling me?
 

cPanelMichael

Administrator
Staff member
Apr 11, 2011
47,880
2,267
463