Here is the CloudStack press release,
How to Mitigate OpenSSL HeartBleed Vulnerability in Apache CloudStack

Wed Apr 09 2014 07:52:17 GMT+0200 (SAST)

Earlier this week, a security vulnerability was disclosed in OpenSSL, one of 
the software libraries that Apache CloudStack uses to encrypt data sent over 
network network connections. As the vulnerability has existed in OpenSSL since 
early 2012, System VMs in Apache CloudStack versions 4.0.0-incubating-4.3 are 
running software using vulnerable versions of OpenSSL. This includes 
CloudStack's Virtual Router VMs, Console Proxy VMs, and Secondary Storage VMs.

We are actively working on creating updated System VM templates for each recent 
version of Apache CloudStack, and for each of the hypervisor platforms which 
Apache CloudStack supports. Due to our testing and QA processes, this will take 
several days. In the meantime, we want to provide our users with a temporary 
workaround for currently running System VMs.

If you are running Apache CloudStack 4.0.0-incubating through the recent 4.3 
release, the the following steps will help ensure the security of your cloud 
infrastructure until an updated version of the System VM template is available:

 1.  As an administrator in the CloudStack web UI, navigate to 
Infrastructure->System VMs
 2.  For each System VM listed, note the host it is running on, and it's "Link 
Local IP address."
 3.  With that data, perform the following steps for each System VM:
    *   ssh into that host as root
    *   From the host, ssh into the SSVM via it's link local IP address: (e.g. 
ssh -i /root/.ssh/id_rsa.cloud -p 3922 169.254.3.33)
    *   On the System VM, first run "apt-get update"
    *   Then run apt-get install openssl. If a dialog appears asking to restart 
programs, accept it's request.
    *   Next, for Secondary Storage VMs, run /etc/init.d/apache2 restart
    *   Log out of the System VM and host server
 4.  Back in the CloudStack UI, now navigate to Infrastructure->Virtual 
Routers. For each VR, host it's running on and it's link local IP address, and 
then repeat steps a-f above.

We realize that for larger installations where System VMs are being actively 
created and destroyed based on customer demand, this is a very rough stop-gap. 
The Apache CloudStack security team is actively working on a more permanent fix 
and will be releasing that to the community as soon as possible.

For Apache CloudStack installations that secure the web-based user-interface 
with SSL, these may also be vulnerable to HeartBleed, but that is outside the 
scope of this blog post. We recommend testing your installation with [1] to 
determine if you need to patch/upgrade the SSL library used by any web servers 
(or other SSL-based services) you use.

1: http://filippo.io/Heartbleed/

On 04/09/2014 12:03 PM, Len Bellemore wrote:

Hi Guys,

Does anyone know which version of ACS are affected by the Hearbleed OpenSSL 
flaw?
- http://heartbleed.com/

Thanks
Len

________________________________
IMPORTANT NOTICE. This electronic message contains information from Control 
Circle Ltd, which may be privileged or confidential. The information is 
intended for use only by the individual(s) or entity named above. If you are 
not the intended recipient, be aware that any disclosure, copying, distribution 
or use of the contents of this information is strictly prohibited. If you have 
received this electronic message in error, please notify me by telephone or 
email (to the number or email address above) immediately. Activity and use of 
the ControlCircle e-mail system is monitored to secure its effective operation 
and for other lawful business purposes. Communications using this system will 
also be monitored and may be recorded to secure effective operation and for 
other lawful business purposes


Disclaimer: This message and/or attachment(s) may contain privileged, 
confidential and/or personal information. If you are not the intended recipient 
you may not disclose or distribute any of the information contained within this 
message. In such case you must destroy this message and inform the sender of 
the error. T-Systems does not accept liability for any errors, omissions, 
information and viruses contained in the transmission of this message. Any 
opinions, conclusions and other information contained within this message not 
related to T-Systems' official business is deemed to be that of the individual 
only and is not endorsed by T-Systems.

This message and/or attachment(s) may contain privileged or confidential        
 
information. If you are not the intended recipient you may not disclose or      
  
distribute any of the information contained within this message. In such
case you must destroy this message and inform the sender of the error.
T-Systems does not accept liability for any errors, omissions, information
and viruses contained in the transmission of this message. Any opinions, 
conclusions and other information contained within this message not related 
to T-Systems' official business is deemed to be that of the individual only 
and is not endorsed by T-Systems.        
                                                                                
  
T-Systems - Business Flexibility

Reply via email to