Solved

Shellshock Bash Vulnerability

  • 25 September 2014
  • 6 replies
  • 1275 views

Userlevel 2
Badge +14
It looks like my CVM's running 4.0.1.1 are vulnerable to the now hyped-up CVE-2014-6271. What is the official Nutanix stance on remediating the vulnerability - should I wait for an NOS hotfix or can I pull down the relevant CentOS patch?
icon

Best answer by dlink7 26 September 2014, 16:57

View original

This topic has been closed for comments

6 replies

Userlevel 1
Badge +9
Hello, It is not supported to apply patches from other sources. Also, please note the field advisory that went out for Shellshock: FIELD ADVISORY #0023 - https://s3.amazonaws.com/ntnx-portal/alerts/Nutanix-Field-Advisory_0023.pdf - posted on our support.nutanix.com site as well.. Thanks!
Badge +3
I think so!
Userlevel 2
Badge +14
It may be possible but it's definitely not supported/recommended.
Badge +3
Is it possible to apply the official CentOS bash not vulnerable packeage on the CVM?

You can check it with something like:

env VAR='() { :;}; echo I am vulnerable!' bash -c "echo Bash Test"

Just finish to fix a lot of CentOS boxes with bash-4.1.2-15.el6_5.2.x86_64

Cheers,

Rick
Userlevel 4
Badge +19
Regardless of the patch, keeping managment seperated is the first step. You can also use iptables on the CVM to restrict traffic.
Userlevel 2
Badge +14
Per conversation with my SRE, it sounds like Nutanix will be pulling the hotfix down from CentOS and porting it into an upcoming release. Specific timing should be disclosed later today.