Difference between revisions of "Live GIS Disc Press Release 49"
Line 3: | Line 3: | ||
14 April 2014 | 14 April 2014 | ||
− | The [http://heartbleed.com/ Heartbleed Bug] - described in [http://www.ubuntu.com/usn/usn-2165-1/ this Ubuntu Security Note] - is a serious security exposure, and the relevant software components are shipped on the | + | The [http://heartbleed.com/ Heartbleed Bug] - described in [http://www.ubuntu.com/usn/usn-2165-1/ this Ubuntu Security Note] - is a serious security exposure, and the relevant software components are shipped on the OSGeo-Live from version 6.0 to the present. Please read the following text carefully, and apply to your own OSGeo-Live usage as appropriate. |
As described in many widely available posts on the Internet, the HeartBleed vulnerability is exposed when network software uses the Transport Layer Security (TLS) feature built on top of a current version of the encryption library openssl. The fix to the vulnerability is to upgrade the openssl package via the Ubuntu/Debian apt mechanism. | As described in many widely available posts on the Internet, the HeartBleed vulnerability is exposed when network software uses the Transport Layer Security (TLS) feature built on top of a current version of the encryption library openssl. The fix to the vulnerability is to upgrade the openssl package via the Ubuntu/Debian apt mechanism. | ||
− | No software on the OSGeoLive is configured to serve network connections using TLS "out of the box." However, some software (such as QGis) which provide WMS connectivity to other network services, may create a reverse-vulnerability when a secure connection is established. By patching your | + | No software on the OSGeoLive is configured to serve network connections using TLS "out of the box." However, some software (such as QGis) which provide WMS connectivity to other network services, may create a reverse-vulnerability when a secure connection is established. By patching your OSGeo-Live openssl library, you can close that reverse-exposure. |
− | Please note that the | + | Please note that the OSGeo-Live project does not recommend using the Live "as-is" for production deployment on the Internet. |
All users of OSGeo Live from versions 6.0 to the present 7.9 release are strongly encouraged to apply software updates to any installed system | All users of OSGeo Live from versions 6.0 to the present 7.9 release are strongly encouraged to apply software updates to any installed system | ||
Line 22: | Line 22: | ||
== How to Fix == | == How to Fix == | ||
− | The | + | The OSGeo-Live project recommends that all installed versions of an affected OSGeo-Live release follow at a minimum, these steps: |
<pre> | <pre> | ||
sudo apt-get update | sudo apt-get update |
Revision as of 15:40, 13 April 2014
OSGeo-Live and HeartBleed vulnerability
14 April 2014
The Heartbleed Bug - described in this Ubuntu Security Note - is a serious security exposure, and the relevant software components are shipped on the OSGeo-Live from version 6.0 to the present. Please read the following text carefully, and apply to your own OSGeo-Live usage as appropriate.
As described in many widely available posts on the Internet, the HeartBleed vulnerability is exposed when network software uses the Transport Layer Security (TLS) feature built on top of a current version of the encryption library openssl. The fix to the vulnerability is to upgrade the openssl package via the Ubuntu/Debian apt mechanism.
No software on the OSGeoLive is configured to serve network connections using TLS "out of the box." However, some software (such as QGis) which provide WMS connectivity to other network services, may create a reverse-vulnerability when a secure connection is established. By patching your OSGeo-Live openssl library, you can close that reverse-exposure.
Please note that the OSGeo-Live project does not recommend using the Live "as-is" for production deployment on the Internet.
All users of OSGeo Live from versions 6.0 to the present 7.9 release are strongly encouraged to apply software updates to any installed system
OSGeo-Live releases effected include
OSGeo-Live releases based on Ubuntu 12.04 are effected. This includes versions:
- 6.0
- 6.5
- 7.0
- 7.9
How to Fix
The OSGeo-Live project recommends that all installed versions of an affected OSGeo-Live release follow at a minimum, these steps:
sudo apt-get update sudo apt-get install libssl1.0.0
The default password is "user" (four characters).
Using the graphical update manager will also work click the 8 pointed start in the top toolbar. Make sure to check for updates and apply any updates to libssl available.
A restart of all services is recommended after the update is applied. You can either do them by hand or reboot the whole system.