In order to apply patches for the recent glibc resolver buffer
overflow vulnerability, we plan to reboot all of the CloudLab control
servers today at 5PM MST. This will temporarily interrupt
instantiation of new experiments, and the CloudLab web portal will
also be unavailable for 15 minutes or so.
Related to this glibc vulnerability, we ask that you:
* Please perform a software update on nodes in running experiments
If you expect that your experiment(s) will run for more than two days
from now, please update your nodes via the running OS's distribution's
update mechanism:
As root on Ubuntu:
apt-get update
apt-get upgrade
reboot
As root on CentOS:
yum update
reboot
Notes: If "grub" is updated in this process, it may ask where it
should install itself. Choose "/dev/sda1" for anything other than
Ubuntu 12. For Ubuntu 12, choose "/dev/sda2". Also choose to keep
any existing configuration files if/when prompted (e.g., for Grub,
OpenSSH server, etc.)
* Please update your custom disk images
If you use a custom disk image, please perform a system software
update as described above, and re-snapshot your image.
Email support@cloudlab.us with questions.
More info on the glibc vulnerability can be found here:
https://access.redhat.com/
No comments:
Post a Comment