It's not a safe approach, because upgrade without testing may introduce
other bugs, such as one bug we saw recently introduced by upgrade of
openswan. I think we still need to generate template, then distribute it
after testing.

If we can maintain an supported Debian repo for CloudStack, then it would
be much easier for upgrade.

--Sheng

On Tue, Sep 30, 2014 at 5:31 PM, ilya musayev <ilya.mailing.li...@gmail.com>
wrote:

> Perhaps we take an approach from a different angle.
>
> Each time systemvm deployed, it mounts an ISO which contains some shell
> scripts that are run on first boot.
>
> We can alter the iso file and "inject" user specified script that will run
> "apt-get/yum update bash" or anything else user needs to do to customize
> the router vm to his liking.
>
> Regards
> ilya
>
> On 9/30/14, 4:26 PM, Adrian Lewis wrote:
>
>> @John - Quite agree. It's not just scripts that need checking either. Very
>> unsettling to have a vulnerable version of bash on every system vm, many
>> with direct access to both the CS infrastructure as well as client VMs.
>> All
>> it takes is for someone to find another vector (e.g. DHCP, DNSmasq) other
>> than a script to inject system variables and there's suddenly a MUCH
>> bigger
>> problem.
>>
>> Is there no way to simply update the version of bash included with the
>> system vm template? At the moment it seems to be version 4.2.37 which is
>> vulnerable (based on
>> http://cloudstack.apt-get.eu/systemvm/4.4/systemvm64template-4.4.1-7-
>> vmware.ova).
>>
>> I'm not too familiar with what happens to the template as it's deployed
>> but
>> if I log in as root/password to the system vm template running as
>> downloaded
>> in VMware Workstation and 'echo $SHELL' I get '/bin/bash' even though
>> '/bin/sh' is a symlink to '/bin/dash'.
>>
>> Perhaps someone is already working quietly on this but surely this should
>> be
>> treated as a fairly major priority? I'd far rather not have bombs in every
>> system vm in the first place regardless of whether people think there
>> aren't
>> any detonators.
>>
>> Adrian
>>
>> -----Original Message-----
>> From: John Kinsella [mailto:j...@stratosec.co]
>> Sent: 30 September 2014 22:57
>> To: dev@cloudstack.apache.org
>> Subject: Re: Shellshock
>>
>> I’m not worried about any specific use-case, but I’d rather not have
>> vulnerable software running on SSVMs in general.
>>
>> John
>>
>> On Sep 30, 2014, at 2:47 PM, Sheng Yang
>> <sh...@yasker.org<mailto:sh...@yasker.org>> wrote:
>>
>> The parameters of system() function have been verified as valid IP/netmask
>> format by script, so I don't think other parameters would be able to slip
>> in
>> in this case.
>>
>> --Sheng
>>
>> On Tue, Sep 30, 2014 at 8:38 AM, Go Chiba
>> <go.ch...@gmail.com<mailto:go.ch...@gmail.com>> wrote:
>>
>> Hi folks,
>>
>> By my digging, ipcalc included system() function call but debian based our
>> system vm are using dash as system shell. So I think this shellshock
>> concern
>> are not directly affected to system vm cgi-bin. right?
>>
>> GO
>>
>> from my iPhone
>>
>> 2014/09/30 10:13、Demetrius Tsitrelis
>> <demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com>>
>> のメッセージ:
>>
>> http://systemvm-public-ip/cgi-bin/ipcalc is a perl script.
>>
>> -----Original Message-----
>> From: Sheng Yang [mailto:sh...@yasker.org]
>> Sent: Monday, September 29, 2014 5:21 PM
>> To: <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
>> Subject: Re: Shellshock
>>
>> http://systemvm-public-ip/cgi-bin/ipcalc is NOT a bash script, so it's
>> normal that it cannot be exploited.
>>
>> --Sheng
>>
>> On Fri, Sep 26, 2014 at 1:57 PM, Demetrius Tsitrelis <
>> demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com>>
>> wrote:
>>
>> Do you mean you tried setting the USER_AGENT like in
>> https://community.qualys.com/blogs/securitylabs/2014/09/25/qualysguard
>> -remote-detection-for-bash-shellshock
>> ?
>>
>>
>> -----Original Message-----
>> From: Ian Duffy [mailto:i...@ianduffy.ie]
>> Sent: Friday, September 26, 2014 6:56 AM
>> To: CloudStack Dev
>> Subject: Re: Shellshock
>>
>> Tried this against the latest system vms built on Jenkins.
>>
>> Didn't get a successful exploited response. Tested against
>> http://systemvm
>> - public-ip/cgi-bin/ipcalc
>> On 25 Sep 2014 16:56, "Abhinandan Prateek" <agneya2...@gmail.com>
>> wrote:
>>
>>
>> After heart bleed we are Shell shocked
>> http://www.bbc.com/news/technology-29361794 !
>> It may not affect cloudstack directly as it is a vulnerability that
>> affects
>> bash, and allows the attacker to take control of the system running bash
>> shell.
>>
>> -abhi
>>
>>
>>
>> Stratosec - Secure Finance and Heathcare Clouds http://stratosec.co
>> o: 415.315.9385
>> @johnlkinsella<http://twitter.com/johnlkinsella>
>>
>
>

Reply via email to