<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>linux on Triton Product Security</title>
    <link>/tags/linux/</link>
    <description>Recent content in linux on Triton Product Security</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 13 Mar 2025 14:37:00 -0400</lastBuildDate><atom:link href="/tags/linux/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>TPS-2025-002 Debian 12 LX image from 2024-07-26 has static SSH host keys</title>
      <link>/tps-2025-002/</link>
      <pubDate>Thu, 13 Mar 2025 14:37:00 -0400</pubDate>
      
      <guid>/tps-2025-002/</guid>
      <description>Overview Per today&amp;rsquo;s email to SmartOS and Triton discussion lists, we are are taking down image 60f76fd2-143f-4f57-819b-1ae32684e81b from our image repository today. That image has pre-generated SSH host keys. Unless an LX zone had regenerated these keys, they are shared across all LX zones running that image.
Actions Taken by Us Prior to the aforementioned discovery, we had updated the Debian 12 LX image to 28f872d5-8227-4f7d-b8f6-30bd5db1f1ac (dated 2025-01-20). We have removed image 60f76fd2-143f-4f57-819b-1ae32684e81b (dated 2024-07-06) completely.</description>
    </item>
    
    <item>
      <title>TPS-2019-002 SSH public keys of Joyent users/development hosts in some published images</title>
      <link>/tps-2019-002/</link>
      <pubDate>Thu, 28 Feb 2019 00:00:00 +0000</pubDate>
      
      <guid>/tps-2019-002/</guid>
      <description>Overview In the process of creating images, some of Joyent&amp;rsquo;s internal-use SSH public keys were inadvertently left in certain published images. This led to the risk of potential unauthorized access to instances using the affected images.
Joyent acknowledges the assistance of an Open Source user in discovering this issue.
Background Joyent creates and publishes images to our Triton public cloud. These images are of various operating systems, to be used by customers in creating instances that run on the cloud.</description>
    </item>
    
    <item>
      <title>TPS-2019-001 Certain Docker or Kubernetes configurations in KVM or bhyve(CVE-2019-5736)</title>
      <link>/tps-2019-001/</link>
      <pubDate>Thu, 14 Feb 2019 00:00:00 +0000</pubDate>
      
      <guid>/tps-2019-001/</guid>
      <description>Overview CVE-2019-5736 has been detected and remediation has been strategized, as detailed here.
This vulnerability relies on an unsafe container configuration known as privileged containers.
SmartOS is immune to this attack. While Triton and SmartOS implement the same interface as Docker, the runC program that is used on Linux is not used in SmartOS. SmartOS is immune to similar vulnerabilities that may exist in any other program because the SmartOS handles per-zone identity in a stricter fashion than Linux privileged containers.</description>
    </item>
    
    <item>
      <title>TPS-2017-002 High-Severity &#34;Dirty Cow&#34; Vulnerability (CVE-2016-5195)</title>
      <link>/tps-2017-002/</link>
      <pubDate>Thu, 05 Jan 2017 02:37:19 +0000</pubDate>
      
      <guid>/tps-2017-002/</guid>
      <description>Overview This notice is to advise the user groups identified below of CVE-2016-5195, the high-severity &amp;ldquo;Dirty Cow&amp;rdquo; vulnerability first announced here (and on other sites) in November 2016.
Description This race condition is in mm/gup.c in the Linux kernel 2.x through 4.x (before 4.8.3), and it allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping.
The only affected Joyent images are KVM images, so those have been updated accordingly.</description>
    </item>
    
    <item>
      <title>TPS-2016-010 OpenSSL High-Severity CVE-2016-6304 / Node.js CVE-2016-7099 and Other Vulnerabilities</title>
      <link>/tps-2016-010/</link>
      <pubDate>Mon, 10 Oct 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-010/</guid>
      <description>How To Update Your Services SmartOS Users New releases of the Node.js and OpenSSL packages have been added to our pkgsrc repository (see below for specific details). The following latest package releases address the vulnerabilities outlined in this post&amp;rsquo;s &amp;ldquo;Original Notice&amp;rdquo; section:
nodejs-6.7.0.tgz (2016Q3) nodejs-4.6.0.tgz (2014Q4, 2015Q4, 2016Q3) nodejs-0.12.16.tgz (2014Q4, 2015Q4, 2016Q3) nodejs-0.10.47.tgz (2014Q4, 2015Q4, 2016Q3) openssl-1.0.2j.tgz (2015Q4, 2016Q3) openssl-1.0.2i.tgz (2015Q4) openssl-1.0.1u.tgz (2014Q4) If you are running on an older SmartOS image that is using a deprecated pkgsrc repository, you may still try installing the correct fixed package by using the following command (NOTE: please test for any potential incompatibilities on a non-production machine prior to trying this):</description>
    </item>
    
    <item>
      <title>TPS-2016-009 Node.js Vulnerabilities CVE-2016-1669 and CVE-2014-9748</title>
      <link>/tps-2016-009/</link>
      <pubDate>Sun, 15 May 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-009/</guid>
      <description>How To Update Your Services SmartOS Users New releases of the Node.js packages have been added to the 2016Q1 pkgsrc repository. The following latest package releases address the vulnerabilities outlined in this notice:
nodejs-5.12.0.tgz nodejs-4.4.7.tgz nodejs-0.12.15.tgz nodejs-0.10.46.tgz If you are running on a SmartOS image that is using a different pkgsrc repository, you can still install the above by using the following command (you may want to first test for any potential incompatibilities on a non-production machine):</description>
    </item>
    
    <item>
      <title>TPS-2016-008 OpenSSL CVE-2016-2108, CVE-2016-2107, Other Vulnerabilities</title>
      <link>/tps-2016-008/</link>
      <pubDate>Tue, 03 May 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-008/</guid>
      <description>How To Update Your Services Triton Cloud (public cloud) users and Triton Enterprise (on-premises, private cloud) software users Update to the fixed release of the affected versions, as shown in the table below:
CVE Version(s) Affected Fixed Release(s) Where Available CVE-2016-2108 OpenSSL 1.0.1, OpenSSL 1.0.2 OpenSSL 1.0.1o, OpenSSL 1.0.2c 2014Q2, 2014Q4 2015Q2 CVE-2016-2107, CVE-2016-2105, CVE-2016-2106, CVE-2016-2109, and CVE-2016-2176 OpenSSL 1.0.1 OpenSSL 1.0.2 OpenSSL 1.0.1o OpenSSL 1.0.2h 2014Q4 2015Q4, 2016Q1 You can determine whether OpenSSL is installed (as well as the version you have installed) by running:</description>
    </item>
    
    <item>
      <title>TPS-2016-006 Node.js Vulnerabilities CVE-2016-2086 and CVE-2016-2216</title>
      <link>/tps-2016-006/</link>
      <pubDate>Thu, 07 Apr 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-006/</guid>
      <description>How To Update Your Services SmartOS Users New releases of the node.js packages have been added to the 2014Q4 and 2015Q4 pkgsrc repositories. The following latest package releases address the vulnerabilities outlined in this notice:
nodejs-0.10.42.tgz nodejs-0.12.10.tgz nodejs-4.3.0.tgz nodejs-5.6.0.tgz If you are running on a SmartOS image that is using a different pkgsrc repository, you can still install the above by using the following command (you may want to first test for any potential incompatibilities on a non-production machine):</description>
    </item>
    
    <item>
      <title>TPS-2016-005 OpenSSL CVE-2016-0800, CVE-2016-0705, CVE-2016-0798, CVE-2016-0797, CVE-2016-0799 and CVE-2016-0702</title>
      <link>/tps-2016-005/</link>
      <pubDate>Thu, 10 Mar 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-005/</guid>
      <description>How To Update Your Services SmartOS Users The new releases referenced in the &amp;ldquo;Original Notice&amp;rdquo; section (below) have been added to the 2014Q4 and 2015Q4 pkgsrc repositories. The following latest package releases address the vulnerabilities outlined in this notice:
openssl-1.0.1s.tgz (now available in the 2014Q4 pkgsrc repository) openssl-1.0.2g.tgz (now available in the 2015Q4 repository) If you are running on a SmartOS image that is using a different pkgsrc repository, you can still install the above by using the following command (you may want to first test for any potential incompatibilities on a non-production machine):</description>
    </item>
    
    <item>
      <title>TPS-2016-004 2015-7547 glibc getaddrinfo stack-based buffer overflow</title>
      <link>/tps-2016-004/</link>
      <pubDate>Tue, 16 Feb 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-004/</guid>
      <description>Joyent Engineers are aware of the glibc (CVE-2015-7547) security vulnerability believed to be found in all versions of the glibc since 2.9. The glibc DNS client side resolver is vulnerable to a stack-based buffer overflow when the getaddrinfo() library function is used. Software using this function may be exploited with attacker-controlled domain names, attacker-controlled DNS servers, or through a man-in-the-middle attack.
For any Joyent customers using glibc in their [Docker containers2], LX zones, or KVM instances, it is advised to update glibc if you are on a vulnerable version.</description>
    </item>
    
    <item>
      <title>TPS-2016-003 ZDI-CAN-3263, ZDI-CAN-3284 and ZDI-CAN-3364 Vulnerabilities</title>
      <link>/tps-2016-003/</link>
      <pubDate>Sun, 14 Feb 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-003/</guid>
      <description>Overview Please read this first
Through HP&amp;rsquo;s Zero Day Initiative, we have previously been made aware of the three security issues described in this Overview:
These vulnerabilities have already been fixed throughout the Joyent Public Cloud. On-premises Triton (SDC7) software customers can mitigate all of these issues by following the (previously-provided) instructions referenced in the Recommendations/Fixes section below. These three vulnerabilities will be announced on Tuesday, 16-February-2016 at Zero Day&amp;rsquo;s &amp;ldquo;Upcoming Advisories&amp;rdquo;.</description>
    </item>
    
    <item>
      <title>TPS-2016-002 OpenSSH CVE-2016-0777 and CVE-2016-0778</title>
      <link>/tps-2016-002/</link>
      <pubDate>Thu, 14 Jan 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-002/</guid>
      <description>Overview Two new vulnerabilities in the OpenSSH SSH client (CVE-2016-0777 and CVE-2016-0778) allow a malicious or compromised SSH server to induce the client to leak arbitrary memory (including the client&amp;rsquo;s private keys), and, in some versions of the client, execute arbitrary code on the client system. The client checks the server&amp;rsquo;s host keys before reaching the point of vulnerability, so a man-in-the-middle attack is not a realistic vector (unless the server&amp;rsquo;s host keys have already been disclosed).</description>
    </item>
    
    <item>
      <title>TPS-2016-001 Node.JS Vulnerability CVE-2015-8027 and CVE-2015-6764</title>
      <link>/tps-2016-001/</link>
      <pubDate>Sun, 03 Jan 2016 00:00:00 +0000</pubDate>
      
      <guid>/tps-2016-001/</guid>
      <description>SmartOS Users New releases of the node.js packages have been added to the 2014Q4 pkgsrc repository. The following latest package releases address the vulnerabilities outlined in this notice:
nodejs-0.12.9.tgz nodejs-4.2.3.tgz If you are running on a SmartOS image that is using a different pkgsrc repository, you can still install the above by using the following command:
pkg_add http://pkgsrc.joyent.com/packages/SmartOS/2014Q4/x86_64/All/nodejs-0.12.9.tgz pkg_add http://pkgsrc.joyent.com/packages/SmartOS/2014Q4/x86_64/All/nodejs-4.2.3.tgz You can visit the Node.js website for more information about these vulnerabilities, and the specific releases that have been identified as vulnerable.</description>
    </item>
    
    <item>
      <title>TPS-2015-007 OpenSSL OpenSSL Security Advisory</title>
      <link>/tps-2015-007/</link>
      <pubDate>Fri, 04 Dec 2015 00:00:00 +0000</pubDate>
      
      <guid>/tps-2015-007/</guid>
      <description>SmartOS Users As per the table outlined below, users should update to the fixed release of the affected versions. For users running on the older 1.0.0 or 0.9.8 versions of OpenSSL, you are advised to upgrade to later versions of OpenSSL.
CVE Version(s) Affected Fixed Release(s) Where Available (pkgsrc repo) CVE-2015-3193 OpenSSL 1.0.2 OpenSSL 1.0.2e 2015Q3 CVE-2015-3194 OpenSSL 1.0.2, 1.0.1 OpenSSL 1.0.2e, 1.0.1q 2015Q3, 2014Q4 CVE-2015-3195 OpenSSL 1.0.2, 1.0.1, 1.0.0, 0.</description>
    </item>
    
    <item>
      <title>TPS-2015-006 OpenSSL &#34;Man-in-the-Middle&#34; Vulnerability (CVE-2015-1793)</title>
      <link>/tps-2015-006/</link>
      <pubDate>Thu, 03 Dec 2015 00:00:00 +0000</pubDate>
      
      <guid>/tps-2015-006/</guid>
      <description>Introduction This advisory describes the scope of the recently-announced, &amp;ldquo;high-severity&amp;rdquo; OpenSSL vulnerability classified as CVE-2015-1793. This vulnerability could allow &amp;ldquo;man-in-the-middle&amp;rdquo; attackers to impersonate HTTPS servers and snoop on encrypted traffic.
Described in the sections below are actions being taken by Joyent, and actions recommended for customers to take. This article is meant to be used in addition to our 18-June-2015 and 20-March-2015 advisories regarding previously-announced OpenSSL vulnerabilities.
Upgrading your own OpenSSL version 1.</description>
    </item>
    
    <item>
      <title>TPS-2015-004 Logjam and Other Recent OpenSSL Vulnerabilities</title>
      <link>/tps-2015-004/</link>
      <pubDate>Thu, 18 Jun 2015 00:00:00 +0000</pubDate>
      
      <guid>/tps-2015-004/</guid>
      <description>Introduction This advisory describes the scope of the following recently-announced OpenSSL vulnerabilities, including Logjam:
CVE-2015-4000 (Logjam) CVE-2015-1788 CVE-2015-1789 CVE-2015-1790 CVE-2015-1792 CVE-2015-1791 CVE-2014-8176 Described in the sections below are actions being taken by Joyent, and actions recommended for customers to take:
We made this advisory public on 18-June-2015. This advisory is meant to be used in addition to our 20-March-2015 article regarding previously-announced OpenSSL vulnerabilities. Upgrading your own OpenSSL version 1.0.1 or 1.</description>
    </item>
    
    <item>
      <title>TPS-2015-002 Addressing Recent OpenSSL Vulnerabilities</title>
      <link>/tps-2015-002/</link>
      <pubDate>Fri, 20 Mar 2015 00:00:00 +0000</pubDate>
      
      <guid>/tps-2015-002/</guid>
      <description>The following sections describe the scope of several recently-announced Open SSL Vulnerabilities. We have included actions being taken by Joyent, and actions recommended for customers to take.
CVEs specific to OpenSSL version 1.0.2 Joyent has never shipped any versions of OpenSSL version 1.0.2 to customers, either in pkgsrc or as part of SmartDataCenter (SDC). If we do ship 1.0.2 versions in the future, they will be those versions known to contain the recent security fixes.</description>
    </item>
    
    <item>
      <title>TPS-2015-001 Security Advisory for &#34;GHOST&#34; Vulnerability on Linux Systems (CVE-2015-0235)</title>
      <link>/tps-2015-001/</link>
      <pubDate>Wed, 28 Jan 2015 00:00:00 +0000</pubDate>
      
      <guid>/tps-2015-001/</guid>
      <description>This notice is to advise Joyent Public Cloud and Smart Data Center customers of the recently identified glibc Linux security issue CVE-2015-0235 (GHOST).
This vulnerability can be triggered by the gethostbyname functions, impacting many systems built on Linux.
How can you determine whether you are vulnerable? You can scan for this vulnerability using the Qualys Vulnerability Management Cloud Solution as QID 123191. If you think you may be affected, patches are available from all of the Linux vendors starting today.</description>
    </item>
    
  </channel>
</rss>
