× NETGEAR will be terminating ReadyCLOUD service by July 1st, 2023. For more details click here.
Orbi WiFi 7 RBE973
Reply

Re: ROS 6, OpenSSL, and magic package upgrades?

btaroli
Prodigy

ROS 6, OpenSSL, and package updates?

No sooner do I read this evening that Fedora and others a re quickly working to get OpenSSL 1.0.1e out to fix the latest TLS bug that I log into my 516 to see what version it's running. Oh my, 1.0.1e. When did that happen? Are there magic upgrade faeries on the NAS? 😄
Message 1 of 48
fastfwd
Virtuoso

Re: ROS 6, OpenSSL, and magic package upgrades?

OpenSSL 1.0.1e is over a year old. It does not fix the latest TLS bug reported today (CVE-2014-0160, aka "Heartbleed"). All versions of OpenSSL 1.0.1 before 1.0.1g are vulnerable, as are the 1.0.2 betas up to and including 1.0.2-beta1.

The 1.0.0 and 0.9.8 branches are NOT affected, although of course they have other vulnerabilities and non-security bugs that have been fixed in the later versions.

ReadyNAS devices running OS4 are unaffected by the new bug; they're running 0.9.8o at best. I don't know what version of OpenSSL is running on the OS5 devices.
Message 2 of 48
btaroli
Prodigy

Re: ROS 6, OpenSSL, and magic package upgrades?

Yeah, I was reading more about the patch and realized it's 1.0.1g that has the fix. So ROS 6.1.6 is definitely vulnerable.
Message 3 of 48
alanwsg1
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

My RN102 is running OpenSSL 1.0.1e as part of OS6.1.6,
Can we upgrade it by hand or do we have to wait for an update from Netgear?
Message 4 of 48
MueR
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

I wouldn't wait for an update. With Netgear's average speed of updating, you'll be waiting for months.

Download either the AMD64 or i386 package depending on the architecture of your NAS. To find out which one you need, log in to SSH on your device and type "uname -m". If that returns "x86" take the i386, if it returns "x86_64" use the AMD64 version.

AMD64: http://security.debian.org/debian-secur ... _amd64.deb
i386: http://security.debian.org/debian-secur ... 5_i386.deb

While in SSH, enter the following commands:
AMD64:
wget http://security.debian.org/debian-security/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_amd64.deb
dpkg -i openssl_1.0.1e-2+deb7u5_amd64.deb
service apache2 restart
service ssh restart


i386:
wget http://security.debian.org/debian-security/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_i386.deb
dpkg -i openssl_1.0.1e-2+deb7u5_i386.deb
service apache2 restart
service ssh restart


You're good to go.
Message 5 of 48
alanwsg1
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

Don't those two options both re-install the current (insecure) version - 1.0.1e?
I believe the fixed version is 1.0.1g, which I don't see anywhere.
Message 6 of 48
btaroli
Prodigy

Re: ROS 6, OpenSSL, and magic package upgrades?

Yeah according to http://heartbleed.com/, "Debian Wheezy (stable), OpenSSL 1.0.1e-2+deb7u4" is considered unsafe. It wouldn't appear the package version in the links is any different.
Message 7 of 48
hma9
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

I'm on RN102 (ReadyNas Duo v2?) where # uname -a gives (<masked>):
Linux <HOSTNAME> 3.0.101.RN_ARM.1 #1 <INSTALLDATE> armv7l GNU/Linux

Looking at the Debian ports there are "armel" and "armhf" variants, and from https://wiki.debian.org/ArmHardFloatPort#Name_of_the_port I think it is armhf I would need.

But as alanwsg already pointed out it seems we still need to wait for a 1.0.1g package. Or is it feasible to compile from source? Searching for arm compilation I mostly found cross-compling howtos. Is it as simple as extracting the source of openssl in a directory, and running make? Will that screw up future web-GUI ReadyNAS upgrades?
Message 8 of 48
hma9
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

Reading https://www.debian.org/security/2014/dsa-2896 and https://security-tracker.debian.org/tracker/CVE-2014-0160
I have to guess Debian backported the fix to the above linked versions, so although their names contain "1.0.1e" the suffix "+deb7u5" seems to mark a version patched with the fix yesterday. The +deb7u6 released today presumably still contains the fix but I didn't see any clear statement about it. Thus alanwsg, btaroli and I were probably wrong in our last comments.

The steps I now took to upgrade my ReadyNas RN102 were (as root):
Edit /etc/apt/sources.list to append "deb http://security.debian.org/debian-security wheezy/updates main" on a new line. (Since I have a plain install I had to use the vi editor, http://www.cs.fsu.edu/general/vimanual.html)
# apt-get update
# apt-get install openssl/wheezy
(An apt-get upgrade did not select openssl, presumably due to the pinning -- http://jaqque.sbih.org/kplug/apt-pinning.html)
# apt-get install libssl1.0.0/wheezy
(I did not install libssl-dev, libssl-doc or libcrypto++9 since they first two were not previously installed and the latter under a lower version number, maybe before the bug was introduced.)
Message 9 of 48
fastfwd
Virtuoso

Re: ROS 6, OpenSSL, and magic package upgrades?

hma9 wrote:
I have to guess Debian backported the fix to the above linked versions, so although their names contain "1.0.1e" the suffix "+deb7u5" seems to mark a version patched with the fix yesterday. The +deb7u6 released today presumably still contains the fix but I didn't see any clear statement about it. Thus alanwsg, btaroli and I were probably wrong in our last comments.

Yes, versions 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 contain the fix. From the changelog:

openssl (1.0.1e-2+deb7u6) wheezy-security; urgency=high

* Non-maintainer upload by the Security Team.
* Enable checking for services that may need to be restarted
* Update list of services to possibly restart

-- Salvatore Bonaccorso <carnil@debian.org> Tue, 08 Apr 2014 10:44:53 +0200

openssl (1.0.1e-2+deb7u5) wheezy-security; urgency=high

* Non-maintainer upload by the Security Team.
* Add CVE-2014-0160.patch patch.
CVE-2014-0160: Fix TLS/DTLS hearbeat information disclosure.
A missing bounds check in the handling of the TLS heartbeat extension
can be used to reveal up to 64k of memory to a connected client or
server.

-- Salvatore Bonaccorso <carnil@debian.org> Mon, 07 Apr 2014 22:26:55 +0200

Message 10 of 48
wtriba
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

I need to update an NV+ (v1). It would seem I need to do this:

wget http://security.debian.org/debian-security/pool/updates/main/o/openssl/openssl_1.0.1e-2+deb7u5_ sparc.deb
dpkg -i openssl_1.0.1e-2+deb7u5_sparc.deb
/etc/init.d/apache2 restart
/etc/init.d/ssh restart


But before I mess things up, I'm hoping someone can let me know if this will work.

Thanks.
Message 11 of 48
wtriba
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

On further checking, my NV+ (v1) has 0.9.8g installed, so it appears that it doesn't not have the heartbleed bug.
Message 12 of 48
alanwsg1
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

I'm afraid I've lost the plot here, my RN102 says it's running 1.0.1e, am I secure or not?
Message 13 of 48
StephenB
Guru

Re: ROS 6, OpenSSL, and magic package upgrades?

alanwsg wrote:
I'm afraid I've lost the plot here, my RN102 says it's running 1.0.1e, am I secure or not?
The bug fixes started rolling out yesterday (7 April 2014), so if you haven't updated OpenSSL manually you are not secure.

I am also confused on how 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 relate to 1.0.1g.
Message 14 of 48
wtriba
Aspirant

Re: ROS 6, OpenSSL, and magic package upgrades?

The simplest way to figure out if you have the bug is to check your version:

dpkg -l | grep openssl


And the build date:

openssl version -b


Any 1.0.1 version with a date older than April 7, 2014 is vulnerable to compromise.
Message 15 of 48
mangrove
Apprentice

Re: ROS 6, OpenSSL, and magic package upgrades?

StephenB wrote:
1.0.1e-2+deb7u6


Backported security fix for wheezy.
Message 16 of 48
StephenB
Guru

Re: ROS 6, OpenSSL, and magic package upgrades?

mangrove wrote:
StephenB wrote:
1.0.1e-2+deb7u6


Backported security fix for wheezy.
Yes, though the guidance from heartbleed.com is to use 1.0.1g. I'm unclear as to what other changes might be missing from 1.0.1e-2+deb7u6.
Message 17 of 48
fastfwd
Virtuoso

Re: ROS 6, OpenSSL, and magic package upgrades?

StephenB wrote:
The bug fixes started rolling out yesterday (7 April 2014), so if you haven't updated OpenSSL manually you are not secure.

That is correct.

StephenB wrote:
I am also confused on how 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 relate to 1.0.1g.

OpenSSL is its own project; it released 1.0.1e a year ago. Shortly thereafter, the Debian project maintainers incorporated it into their Linux distro.

The OpenSSL project released 1.0.1g yesterday, and the Debian project will undoubtedly incorporate that version into the next release of Debian Linux. But it would be imprudent for them to update the earlier, already-released versions of Debian (like "Wheezy", the version used by the ReadyNAS OS6 devices) to 1.0.1g without significant testing, because over the last year many other changes were made between 1.0.1e and 1.0.1g. That testing would take a lot of time, but the bug is serious and should be fixed immediately.

Fortunately, the fix is very straightforward -- just a couple lines of code -- so the Debian Security team decided that it was safe to make just that one bugfix change to Wheezy's 1.0.1e (without adding any of the other changes made to Open SSL over the last year). They released the slightly-modified 1.0.1e as 1.0.1e-2+deb7u5 yesterday, then made some minor tweaks to it today and released that as 1.0.1e-2+deb7u6. Both those versions contain the crucial bugfix; the latter one also handles service-restarts better.

You can see the list of other major changes between 1.0.1e and 1.0.1g by looking at the OpenSSL release notes here: http://www.openssl.org/news/openssl-1.0.1-notes.html. I posted the Debian changelog for 1.0.1e-2+deb7u5 and 1.0.1e-2+deb7u6 in an earlier message.
Message 18 of 48
mangrove
Apprentice

Re: ROS 6, OpenSSL, and magic package upgrades?

StephenB wrote:
Backported security fix for wheezy.
Yes, though the guidance from heartbleed.com is to use 1.0.1g. I'm unclear as to what other changes might be missing from 1.0.1e-2+deb7u6.[/quote]

Debian are after all famously conservative 😄
Security fixes are always backported though.
The version of OpenSSL I use on OS4 was too old to be affected... :roll:
Message 19 of 48
btaroli
Prodigy

Re: ROS 6, OpenSSL, and package updates?

http://www.debian.org/security/2014/dsa-2896

For wheezy (which 6.1.6 falls into) it's fixed in 1.0.1e-2+deb7u5. I'm not sure which major release NV+ and 5.x systems run. Patching it may (for some older systems) come down to Netgear? Not sure.

Don't necessarily go by package version, though. Build is safer. But in general, check the CVE report from each distro to be absolutely sure.
Message 20 of 48
btaroli
Prodigy

Re: ROS 6, OpenSSL, and package updates?

I've applied the deb7u5 openssl to my 6.1.7 installation, as described earlier, and it seems to have worked OK. Strangely, "openssl version" still reports "11 Feb 2013" but the build is dated 07-APR-2014 20:32:27 UTC.
Message 21 of 48
alanwsg1
Aspirant

Re: ROS 6, OpenSSL, and package updates?

OK guys, plot still lost!

If my RN102 says "1.0.1e 11 Feb 2013" when I run "openssl version" ....
-- how do I know if I'm running the patched version?
-- if I update it as described earlier, how will I know if it's worked?
-- how do I view the build number?
-- did they REALLY update the package but not change the version number?
Message 22 of 48
super_poussin
Virtuoso

Re: ROS 6, OpenSSL, and package updates?

better to add this in /etc/apt/sources.list :

deb http://security.debian.org/ wheezy/updates main contrib non-free


that's my opinion

don't forget to regenerate certificates and keys , restarting apache is not enough

to regenerate the certificate change the name clicking on https button

then delete keys in /etc/ssh/ (ssh_host_xxxx files) , delete also files in /root/.ssh

reboot the nas
Message 23 of 48
mangrove
Apprentice

Re: ROS 6, OpenSSL, and package updates?

alanwsg wrote:
-- how do I view the build number?
-- did they REALLY update the package but not change the version number?


openssl version -a
will give you the build date.

It's not a new "version", per se. It's a patched old version. Debian is not bleeding edge. If you want bleeding edge, you will be ill served by "Debian stable", but there is the "Debian testing" release. Typically Debian users are looking for extreme stability and longevity.
Message 24 of 48
Ki_Adi_Mundi
NETGEAR Expert

Re: ROS 6, OpenSSL, and package updates?

alanwsg wrote:
OK guys, plot still lost!

If my RN102 says "1.0.1e 11 Feb 2013" when I run "openssl version" ....
-- how do I know if I'm running the patched version?
-- if I update it as described earlier, how will I know if it's worked?
-- how do I view the build number?
-- did they REALLY update the package but not change the version number?


run "dpkg -l | grep openssl"
Message 25 of 48
Top Contributors
Discussion stats
Announcements