Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
C
configuration
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
OpenEdx
configuration
Commits
1ca05c9a
Commit
1ca05c9a
authored
Jan 29, 2015
by
Fred Smith
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
apply glibc update if vulnerable to CVE-2015-0235
parent
c76243a6
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
65 additions
and
0 deletions
+65
-0
playbooks/roles/security/files/tmp/GHOST.c
+44
-0
playbooks/roles/security/tasks/security-ubuntu.yml
+21
-0
No files found.
playbooks/roles/security/files/tmp/GHOST.c
0 → 100644
View file @
1ca05c9a
/*
* GHOST vulnerability check
* http://www.openwall.com/lists/oss-security/2015/01/27/9
* Usage: gcc GHOST.c -o GHOST && ./GHOST
*/
#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#define CANARY "in_the_coal_mine"
struct
{
char
buffer
[
1024
];
char
canary
[
sizeof
(
CANARY
)];
}
temp
=
{
"buffer"
,
CANARY
};
int
main
(
void
)
{
struct
hostent
resbuf
;
struct
hostent
*
result
;
int
herrno
;
int
retval
;
/*** strlen (name) = size_needed - sizeof (*host_addr) - sizeof (*h_addr_ptrs) - 1; ***/
size_t
len
=
sizeof
(
temp
.
buffer
)
-
16
*
sizeof
(
unsigned
char
)
-
2
*
sizeof
(
char
*
)
-
1
;
char
name
[
sizeof
(
temp
.
buffer
)];
memset
(
name
,
'0'
,
len
);
name
[
len
]
=
'\0'
;
retval
=
gethostbyname_r
(
name
,
&
resbuf
,
temp
.
buffer
,
sizeof
(
temp
.
buffer
),
&
result
,
&
herrno
);
if
(
strcmp
(
temp
.
canary
,
CANARY
)
!=
0
)
{
puts
(
"vulnerable"
);
exit
(
EXIT_SUCCESS
);
}
if
(
retval
==
ERANGE
)
{
puts
(
"OK"
);
exit
(
EXIT_SUCCESS
);
}
puts
(
"should not happen"
);
exit
(
EXIT_FAILURE
);
}
playbooks/roles/security/tasks/security-ubuntu.yml
View file @
1ca05c9a
...
...
@@ -48,3 +48,24 @@
when
:
"
'vulnerable'
in
test_vuln.stdout"
register
:
test_vuln
failed_when
:
"
'vulnerable'
in
test_vuln.stdout"
#### GHOST security vulnerability
-
name
:
GHOST.c
copy
:
>
src=tmp/GHOST.c
dest=/tmp/GHOST.c
owner=root group=root
-
name
:
compile GHOST
shell
:
gcc -o /tmp/GHOST /tmp/GHOST.c
-
name
:
Check if we are vulnerable
shell
:
/tmp/GHOST
register
:
test_ghost_vuln
ignore_errors
:
yes
-
name
:
Apply glibc security update if we are vulnerable
apt
:
name=libc6 state=latest update_cache=true
when
:
"
'vulnerable'
in
test_ghost_vuln.stdout"
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment