blob: 209d404ba2c8390493209e5983f3b3aa13ccdc36 [file] [log] [blame]
---
layout: post
status: PUBLISHED
published: true
title: CloudStack and the "Ghost" glibc vulnerability
author:
display_name: John Kinsella
login: jlk
email: 'jlk@apache.org '
author_login: jlk
author_email: 'jlk@apache.org '
id: b0d62790-8ce4-45cd-9359-a07cfcb67e8d
date: '2015-01-28 20:26:50 -0500'
categories:
- News
tags:
- security
comments:
- id: 0
author: Rohit Yadav
author_email: rohit.yadav@shapeblue.com
author_url: http://bhaisaab.org
date: '2015-01-28 20:03:41 -0500'
content: "NOTE: There is correction in the above:\r\n\r\n1. Mark openswan to not
upgrade, or else VPN related functionality may break:\r\n\r\napt-mark hold openswan\r\n\r\n2.
Clean old cache (not clean can cause disk space issues):\r\n\r\napt-get clean\r\n\r\n3.
Now upgrade:\r\n\r\napt-get update && apt-get upgrade\r\n\r\n4. Restart the VM
(if that is not the options, restart remote services such as SSH, DNS, DHCP, VPN
etc).\r\n\r\nUpdated systemvm templates are available for download from here:\r\nhttp://packages.shapeblue.com/systemvmtemplate/\r\n\r\nMore
information on packages here: http://shapeblue.com/packages\r\n"
- id: 0
author: 192.168.0.1
author_email: giangbebe.1703@gmail.com
author_url: https://19216801help.com/
date: '2017-07-03 04:03:26 -0400'
content: See how far we go now
- id: 62
author: Dotbuffer.com
author_email: dotbuffer@gmail.com
author_url: http://dotbuffer.com/
date: '2015-02-03 00:22:09 -0500'
content: Thank you for this important vulnerability notification.
permalink: cloudstack/entry/cloudstack_and_the_ghost_glibc
---
<p><b>UPDATE: mitigation instructions have been improved (don't update openswan) and we forgot to mention rebooting.</b><br><br />
<b>UPDATE: Links to updated System VM templates are now below</b><br><br />
<br></p>
<p>Yesterday, a buffer overflow vulnerability was announced in glibc that affects most current Linux distributions. In CloudStack, the system VMs contain a vulnerable version of glibc. </p>
<p>CloudStack community members have built an updated system VM template, which ShapeBlue is hosting at <a href="http://packages.shapeblue.com/systemvmtemplate/">http://packages.shapeblue.com/systemvmtemplate/</a> (More information on the packages at <a href="http://shapeblue.com/packages">http://shapeblue.com/packages</a>). </p>
<p>For instructions on how to update the SystemVM template in CloudStack, see <a href="http://support.citrix.com/article/CTX200024">here</a>.</p>
<p>For those who wish to patch their running system VMs, ssh into each one and run:</p>
<pre>
apt-mark hold openswan
apt-get clean
apt-get update && apt-get upgrade
</pre>
<p>After updating glibc, the system will need to be rebooted.</p>
<p>Information about how to connect to your System VMs is available <a href="https://cloudstack.apache.org/docs/en-US/Apache_CloudStack/4.2.0/html/Admin_Guide/accessing-system-vms.html">here</a>.</p>
<h2>Other CloudStack-related systems may be affected!</h2>
<p>Please review security updates from Linux distributions you use on your management server, storage systems, hypervisors, as well as other Linux VMs and bare-metal systems running in your environments. <a href="http://www.cyberciti.biz/faq/cve-2015-0235-patch-ghost-on-debian-ubuntu-fedora-centos-rhel-linux/">This post</a> provides instructions for determining if a system is vulnerable, as well as patching directions for common Linux distributions.</p>