Thanks, that's great clarification.

On Wed, Apr 9, 2014 at 12:15 PM, Animesh Chaturvedi
<animesh.chaturv...@citrix.com> wrote:
> Courtesy Chiradeep
>
>
> - CPVM uses JSSE so that should not be affected
> - VR is not affected since it does not offer any HTTPS/TLS service. The RA 
> VPN and S2S VPN use the OpenSSL lib only for crypto and not for any transport
> - The only vulnerable service is the volume upload service and template copy. 
> The latter is between 2 trusted IPs
> - Also this should only affect SSVM template from 4.2 onwards as only wheezy 
> is affected
>
> Thanks
> Animesh
>> -----Original Message-----
>> From: John Kinsella [mailto:j...@stratosec.co]
>> Sent: Wednesday, April 09, 2014 11:07 AM
>> To: dev@cloudstack.apache.org
>> Subject: Re: OpenSSL vunerability (bleedheart)
>>
>> I want to address a few things here directly (I think these are covered in 
>> the
>> blog post, if not ping me)
>>
>> * Current SSVM from 4.3 is not good enough.
>> * Yes, each SystemVM runs software that needs OpenSSL. For the curious,
>> see "lsof|grep -i ssl"
>> * I'm not sure if the current SystemVM template on Jenkins is secure, we're
>> testing that currently and will update once confirmed.
>> * Assume if you see us releasing a blog post about a security issue, there's 
>> a
>> security issue (QED HTH HAND)
>> * Realhostip uses SSL, but not on the SystemVMs. If you're using realhostIP,
>> it doesn't matter what version of OSSL you use, you're still insecure. Horse:
>> beaten.
>> * Chiradeep's correct, 4.1 and older are not vulnerable. Post updated again.
>>
>> I think that covers the questions...running around doing a few things but 
>> this
>> is very high on our priority list.
>>
>> (snarky comments are meant to be funny not insulting/condescending)
>>
>> On Apr 9, 2014, at 10:19 AM, John Kinsella
>> <j...@stratosec.co<mailto:j...@stratosec.co>> wrote:
>>
>> To my knowledge, no code change is necessary just a rebuild.  - j
>>
>> Please excuse typos - sent from mobile device.
>>
>> ----- Reply message -----
>> From: "Rayees Namathponnan"
>> <rayees.namathpon...@citrix.com<mailto:rayees.namathpon...@citrix.co
>> m>>
>> To: "dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>"
>> <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
>> Subject: OpenSSL vunerability (bleedheart)
>> Date: Wed, Apr 9, 2014 10:13 AM
>>
>> Even if we get latest systemvm template from
>> http://jenkins.buildacloud.org/view/4.3/job/cloudstack-4.3-systemvm/ . , it
>> has openssl 1.0.1e-2+deb7u4 ?
>>
>> Is there any code change required to create system template with openssl
>> 1.0.1e-2+deb7u6  ?
>>
>> Regards,
>> Rayees
>>
>> -----Original Message-----
>> From: Harikrishna Patnala [mailto:harikrishna.patn...@citrix.com]
>> Sent: Wednesday, April 09, 2014 5:15 AM
>> To: <dev@cloudstack.apache.org<mailto:dev@cloudstack.apache.org>>
>> Subject: Re: OpenSSL vunerability (bleedheart)
>>
>> Latest System VMs have openssl 1.0.1e-2+deb7u4. We need to update
>> openssl to get 1.0.1e-2+deb7u6.
>>
>> It will be great if some one can update openssl to 1.0.1e-2+deb7u6 and test
>> OpenSSL HeartBleed Vulnerability. Right now I could not do it from our
>> network.
>>
>> -Harikrishna
>>
>> On 09-Apr-2014, at 5:00 pm, Nux! <n...@li.nux.ro<mailto:n...@li.nux.ro>>
>> wrote:
>>
>> On 09.04.2014 12:04, Abhinandan Prateek wrote:
>> Latest jenkins build template have openSSL version 1.0.1e, the version that 
>> is
>> compromised.
>>
>> Guys, do not panic.
>> It is my understanding that in Debian, just like in RHEL, major versions will
>> not change, i.e. Debian GNU/Linux 7.0 will EOL with openssl 1.0.1e, but they
>> will backport stuff.
>>
>> After I did an "apt-get update && apt-get install openssl" I got package
>> version 1.0.1e-2+deb7u6 (dpkg -l|grep openssl) and this package is ok
>> according to the changelog:
>>
>> "aptitude changelog openssl" says:
>>
>> openssl (1.0.1e-2+deb7u6) wheezy-security; urgency=high
>>
>> * Non-maintainer upload by the Security Team.
>> * Enable checking for services that may need to be restarted
>> * Update list of services to possibly restart
>>
>> -- Salvatore Bonaccorso <car...@debian.org<mailto:car...@debian.org>>
>> Tue, 08 Apr 2014 10:44:53
>> +0200
>>
>> openssl (1.0.1e-2+deb7u5) wheezy-security; urgency=high
>>
>> * Non-maintainer upload by the Security Team.
>> * Add CVE-2014-0160.patch patch.
>>   CVE-2014-0160: Fix TLS/DTLS hearbeat information disclosure.
>>   A missing bounds check in the handling of the TLS heartbeat extension
>>   can be used to reveal up to 64k of memory to a connected client or
>>   server.
>>
>> -- Salvatore Bonaccorso <car...@debian.org<mailto:car...@debian.org>>
>> Mon, 07 Apr 2014 22:26:55
>> +0200
>>
>> In conclusion, if System VMs have openssl 1.0.1e-2+deb7u5 or higher, then
>> they are OK. Can anyone confirm they have 1.0.1e-2+deb7u5+ ?
>>
>> Lucian
>>
>> --
>> Sent from the Delta quadrant using Borg technology!
>>
>> Nux!
>> www.nux.ro<http://www.nux.ro>
>>
>>
>> Stratosec<http://stratosec.co/> - Compliance as a Service
>> o: 415.315.9385
>> @johnlkinsella<http://twitter.com/johnlkinsella>
>

Reply via email to