• Introducing WebPros Cloud - a fully managed infrastructure platform purpose-built to simplify the deployment of WebPros products !  WebPros Cloud enables you to easily deliver WebPros solutions — without the complexity of managing the infrastructure.
    Join the pilot program today!
  • Support for BIND DNS has been removed from Plesk for Windows due to security and maintenance risks.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS.

Resolved Dirty COW (CVE-2016-5195)

SCRINF

New Pleskian
Hi to all
need to update my Centos 7 because:

bash rh-cve-2016-5195_1.sh
[1;31mYour kernel is [0m3.10.0-327.36.2.el7.x86_64[1;31m which IS vulnerable.[0m
Red Hat recommends that you update your kernel. Alternatively, you can apply partial
mitigation described at https://access.redhat.com/security/vulnerabilities/2706661 .

but Plesk indicates not update the kernel in yum update:

"for yum, add to /etc/yum.conf:

exclude=kernel* sendmail bind-chroot caching-nameserver"

Any help please.

Thanks.
 
By default there is no any excludes from Plesk side. Must probably this exclude was added to your yum.conf according to article https://kb.plesk.com/en/234
So, I think that you can upgrade kernel.
 
Hi Igor
my VPS is automatic update from my provider and is on 120.3
2.6.32-042stab120.3 #1 SMP Thu Oct 20 18:18:21 MSK 2016 x86_64 x86_64 x86_64 GNU/Linux

other private server no VPS is update to:
10.0-327.36.2.el7.x86_64 but there is not solve cve-2016-5195 i think need update to 36.3

Thanks for your support.
 
Hi
im happy now:

Your kernel is [0m3.10.0-327.36.3.el7.x86_64[1;32m which is NOT vulnerable.

and Plesk run good... for the moment.

Thanks.
 
Back
Top