June 2024 Security and Maintenance Update
New bugfix, enhancement and security updates are available for the only currently supported release of XCP-ng: 8.2 LTS.
📋 Summary
We usually queue non-critical fixes or improvements for a grouped release, to avoid unnecessary maintenance tasks on your pools. This is one such grouped release, grouped along with a set of security updates.
🔒 Security Updates
qemu
: CVE-2024-5661 - XenServer security bulletin - Fixes to prevent a DoS on hosts that could be caused by a malicious guest's administrator.openssh
: We rebased on CentOS 7'sopenssh-7.4p1-23.el7_9
to include fixes for various CVEs. The update also changes the way default ciphers and algorithms are set. See dedicated section below. The following CVEs are fixed:- CVE-2023-38408: Possible remote code execution if an agent is forwarded to an attacker-controlled system.
- CVE-2023-48795¹: This is the terrapin-attack, it could allow attacker to downgrade the connection's security by truncating the extension negotiation message, enabling them to use a less secure authentication algorithms.
- CVE-2021-41617: Could lead to privilege escalation through the use of AuthorizedKeysCommand and AuthorizedPrincipalsCommand that could be running with sshd group permissions if the configuration specifies running the command as a different user.
curl
: Updated to version 8.6.0, including fix for the critical CVE-2023-38545¹ vulnerability allowing an attacker to trigger a heap buffer overflow through the SOCKS5 proxy handshake.sudo
: Updated to a more recent release to fix some CVEs¹, none of which are critical in the context of XCP-ng as far as we can tell.
microcode_ctl
: Updated to Intel's IPU 2024.2 release. Contains a mitigation for CVE-2023-45733 where a race condition may allow information disclosure.linux-firmware
: Update to AMD firmware to the 2024-05-03 drop. What fixes this contains exactly was not described by AMD.
Updating your hardware's firmware remains the preferred way to update microcode, and any newer microcode found in the firmware will take precedence over the microcode we provide in XCP-ng.
ℹ️ About OpenSSH, ciphers and algorithms
To ensure that the lists of authorized Ciphers, algorithms, etc., defined by XenServer's security team are applied, XenServer packagers had decided that any change they had to make would plainly overwrite /etc/ssh/sshd_config
and /etc/ssh/ssh_config
. Although we discourage customizing XCP-ng's configuration too far, we didn't think it would be acceptable for our users than these files be overwritten without any notice.
So we looked for another approach, and decided for this: we don't define these keys (Ciphers
, MACs
, KexAlgorithms
, HostKeyAlgorithms
) in the configuration files anymore. Now, we define them at build time, directly in the built binaries.
If you need to override them, you can still do so in the configuration files. But then this means you become responsible of their future update, whenever a cipher or algorithm starts being considered weak, as this will override the built-in settings defined by our security team.
The update process will attempt to be smart and will remove the definition of the above keys from /etc/ssh/sshd_config
and /etc/ssh/ssh_config
, but only if you had not touched these lines. If you have brought customizations to these keys, then we will leave them as they were. In this case, this means that any future change our security team may make to the built-in values will not be applied to your hosts, because your changes in the configuration files will override the built-ins.. If you are in this situation, you have to choose: either remove these lines manually, or make sure you keep them updated by yourself according to your security policy.
You can check what configuration is applied to your instance of sshd
with: sshd -T
.
✨ New Feature
sm
: adds the newlargeblock
storage driver, which is a local SR driver which workarounds the current limitation our storage stack has with 4KiB-block-only devices, by transparently emulating a 512B block size (at some performance cost, obviously). More about it in this forum thread.sm
was also rebased on Citrix Hypervisor's hotfix XS82ECU1065.
🪲 Bug Fix and Updates
xapi
: Synced with Citrix Hypervisor hotfixes XS82ECU1064 and XS82ECU1053. Various fixes. Check the hotfixes descriptions.- We also added a fix to make the small web server managed by XAPI report accurate mimetypes for files it serves. This is important for XO Lite (which is not installed by default on XCP-ng 8.2, but can be if you need it).
tzdata
: Updated timezone data.