Kernel does not support the prevention of symlink ownership attacks.

This is how the warning looks in WHM.

In an update to WHM’s Security advisor in version 76, it started checking the kernel version for symlink attacks, which is a vector of attack that various malicious scripts would use to gain access to other files/accounts on the server.

If your server is running Kernel Care then follow the below steps, if it’s not, I would highly recommend you look into getting Kernel Care for your server to apply kernel updates without having to reboot! Or you could purchase Cloud Linux to also apply it’s protection.

To apply the updated patch, you would first have to ssh in to your server as root or at least a user who can run sudo commands as root. Then first you can check to see the symlink protection is not there:

[root@host ~] # kcarectl --patch-info | grep symlink


That should return nothing when you run it. To apply the update, run:

[root@host ~]# kcarectl --set-patch-type extra --update
'extra' patch type selected
Downloading updates
Patch level 2 applied. Effective kernel version 2.6.32-754.6.3.el6
Updates already downloaded
Kernel is safe


Hopefully your results look similar to what is above, if so, try to check for the patch again now:

[root@host ~]# kcarectl --patch-info | grep symlink
kpatch-name: 2.6.32/symlink-protection.patch
kpatch-description: symlink protection
kpatch-name: 2.6.32/symlink-protection.kpatch-1.patch
kpatch-description: symlink protection (kpatch adaptation)


If it returns results similar to those, then it should be all patched! Run the Security Advisor in WHM again (WHM >> Security Center >> Security Advisor) and let it run it’s check and hopefully you should see something like this:


If so, congratulations, you are protected and good to go!

If it doesn’t work, let us know in the comments below.



Add Comment