While testing before release is needed but the component update process with new system template as we have now takes a long time logistically.
Thanks Animesh > -----Original Message----- > From: Sheng Yang [mailto:sh...@yasker.org] > Sent: Tuesday, September 30, 2014 6:08 PM > To: <dev@cloudstack.apache.org> > Subject: Re: Shellshock > > It's not a safe approach, because upgrade without testing may introduce other > bugs, such as one bug we saw recently introduced by upgrade of openswan. I > think we still need to generate template, then distribute it after testing. > > If we can maintain an supported Debian repo for CloudStack, then it would be > much easier for upgrade. > > --Sheng > > On Tue, Sep 30, 2014 at 5:31 PM, ilya musayev <ilya.mailing.li...@gmail.com> > wrote: > > > Perhaps we take an approach from a different angle. > > > > Each time systemvm deployed, it mounts an ISO which contains some > > shell scripts that are run on first boot. > > > > We can alter the iso file and "inject" user specified script that will > > run "apt-get/yum update bash" or anything else user needs to do to > > customize the router vm to his liking. > > > > Regards > > ilya > > > > On 9/30/14, 4:26 PM, Adrian Lewis wrote: > > > >> @John - Quite agree. It's not just scripts that need checking either. > >> Very unsettling to have a vulnerable version of bash on every system > >> vm, many with direct access to both the CS infrastructure as well as client > VMs. > >> All > >> it takes is for someone to find another vector (e.g. DHCP, DNSmasq) > >> other than a script to inject system variables and there's suddenly a > >> MUCH bigger problem. > >> > >> Is there no way to simply update the version of bash included with > >> the system vm template? At the moment it seems to be version 4.2.37 > >> which is vulnerable (based on > >> http://cloudstack.apt-get.eu/systemvm/4.4/systemvm64template-4.4.1-7- > >> vmware.ova). > >> > >> I'm not too familiar with what happens to the template as it's > >> deployed but if I log in as root/password to the system vm template > >> running as downloaded in VMware Workstation and 'echo $SHELL' I get > >> '/bin/bash' even though '/bin/sh' is a symlink to '/bin/dash'. > >> > >> Perhaps someone is already working quietly on this but surely this > >> should be treated as a fairly major priority? I'd far rather not have > >> bombs in every system vm in the first place regardless of whether > >> people think there aren't any detonators. > >> > >> Adrian > >> > >> -----Original Message----- > >> From: John Kinsella [mailto:j...@stratosec.co] > >> Sent: 30 September 2014 22:57 > >> To: dev@cloudstack.apache.org > >> Subject: Re: Shellshock > >> > >> I’m not worried about any specific use-case, but I’d rather not have > >> vulnerable software running on SSVMs in general. > >> > >> John > >> > >> On Sep 30, 2014, at 2:47 PM, Sheng Yang > >> <sh...@yasker.org<mailto:sh...@yasker.org>> wrote: > >> > >> The parameters of system() function have been verified as valid > >> IP/netmask format by script, so I don't think other parameters would > >> be able to slip in in this case. > >> > >> --Sheng > >> > >> On Tue, Sep 30, 2014 at 8:38 AM, Go Chiba > >> <go.ch...@gmail.com<mailto:go.ch...@gmail.com>> wrote: > >> > >> Hi folks, > >> > >> By my digging, ipcalc included system() function call but debian > >> based our system vm are using dash as system shell. So I think this > >> shellshock concern are not directly affected to system vm cgi-bin. > >> right? > >> > >> GO > >> > >> from my iPhone > >> > >> 2014/09/30 10:13、Demetrius Tsitrelis > >> <demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com > >> >> > >> のメッセージ: > >> > >> http://systemvm-public-ip/cgi-bin/ipcalc is a perl script. > >> > >> -----Original Message----- > >> From: Sheng Yang [mailto:sh...@yasker.org] > >> Sent: Monday, September 29, 2014 5:21 PM > >> To: <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>> > >> Subject: Re: Shellshock > >> > >> http://systemvm-public-ip/cgi-bin/ipcalc is NOT a bash script, so > >> it's normal that it cannot be exploited. > >> > >> --Sheng > >> > >> On Fri, Sep 26, 2014 at 1:57 PM, Demetrius Tsitrelis < > >> demetrius.tsitre...@citrix.com<mailto:demetrius.tsitre...@citrix.com> > >> > > >> wrote: > >> > >> Do you mean you tried setting the USER_AGENT like in > >> https://community.qualys.com/blogs/securitylabs/2014/09/25/qualysguar > >> d -remote-detection-for-bash-shellshock > >> ? > >> > >> > >> -----Original Message----- > >> From: Ian Duffy [mailto:i...@ianduffy.ie] > >> Sent: Friday, September 26, 2014 6:56 AM > >> To: CloudStack Dev > >> Subject: Re: Shellshock > >> > >> Tried this against the latest system vms built on Jenkins. > >> > >> Didn't get a successful exploited response. Tested against > >> http://systemvm > >> - public-ip/cgi-bin/ipcalc > >> On 25 Sep 2014 16:56, "Abhinandan Prateek" <agneya2...@gmail.com> > >> wrote: > >> > >> > >> After heart bleed we are Shell shocked > >> http://www.bbc.com/news/technology-29361794 ! > >> It may not affect cloudstack directly as it is a vulnerability that > >> affects bash, and allows the attacker to take control of the system > >> running bash shell. > >> > >> -abhi > >> > >> > >> > >> Stratosec - Secure Finance and Heathcare Clouds http://stratosec.co > >> o: 415.315.9385 > >> @johnlkinsella<http://twitter.com/johnlkinsella> > >> > > > >