CVE-2015-0235 GNU C Library (glibc) Vulnerability in Multiple NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20150127-0001 updates
Subscribe to NTAP-20150127-0001 advisory updates
Unsubscribe from NTAP-20150127-0001 advisory updates
Unsubscribe from NTAP-20150127-0001 advisory updates
Advisory ID: NTAP-20150127-0001 Version: 21.0 Last updated: 03/20/2018 Status: Final. CVEs: CVE-2015-0235
Summary
A vulnerability known as GHOST may affect multiple NetApp products and the impact is under investigation. GNU C Library (glibc) versions up to glibc-2.18 are susceptible to a vulnerability in the gethostbyname*() function potentially leading to arbitrary code execution.
Impact
Exploitation of this vulnerability may lead to arbitrary code execution.
Vulnerability Scoring Details
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
- http://www.openwall.com/lists/oss-security/2015/01/27/9
- https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability
Affected Products
- FlashRay
- NetApp VASA Provider for Clustered Data ONTAP 6.x
- NetApp VTL
- OnCommand Balance
- RapidData Migration Solution
- SnapDrive for Unix
- SnapProtect
- StorageGRID (formerly StorageGRID Webscale)
- StorageGRID9 (9.x and prior)
Products Not Affected
- 7-Mode Transition Tool
- ATTO FibreBridge - 6500N
- Brocade Fabric Operating System Firmware
- Brocade Network Advisor Software
- Cloud Manager
- Cluster Network Switch (NetApp CN1610)
- Clustered Data ONTAP
- Clustered Data ONTAP Antivirus Connector
- Data ONTAP Edge
- E-Series SANtricity Storage Manager
- E-Series SANtricity Web Services (REST API) for Web Services Proxy
- FAS/AFF BIOS
- Host Utilities - SAN for Linux
- Host Utilities - SAN for Windows
- NetApp Cloud Backup (formerly AltaVault)
- NetApp Manageability SDK
- NetApp NFS Plug-in for VMware VAAI
- NetApp SANtricity SMI-S Provider
- NetApp SMI-S Provider
- NetApp SolidFire, Enterprise SDS & HCI Storage Node (Element Software)
- NetApp Storage Encryption
- OnCommand Insight
- OnCommand Performance Manager (Unified Manager Performance Pkg)
- OnCommand Unified Manager for Clustered Data ONTAP
- OnCommand Workflow Automation
- Open Systems SnapVault Agent
- Service Processor
- Single Mailbox Recovery
- Snap Creator Framework
- SnapManager for Exchange
- SnapManager for Hyper-V
- SnapManager for Oracle
- SnapManager for SAP
- SnapManager for Sharepoint
- Storage Services Connector
- System Manager 9.x
Software Versions and Fixes
NetApp's currently available patches are listed below.
Product | First Fixed in Release |
---|---|
SnapProtect |
SnapProtect may directly or indirectly invoke the affected functions but does not bundle the library - the host OS library must be updated for the fix. http://docs.commvault.com/commvault/v10/article?p=announcement/announcements.htm |
NetApp VASA Provider for Clustered Data ONTAP 6.x |
http://mysupport.netapp.com/NOW/download/software/vasa_cdot/6.2/ |
OnCommand Balance |
http://mysupport.netapp.com/NOW/download/software/oncommand_ib/4.2P4/ |
FlashRay |
FlashRay has no plans to address this vulnerability. See the EOA announcement for more information. |
RapidData Migration Solution |
RapidData Migration Solution has no plans to address this vulnerability. |
StorageGRID (formerly StorageGRID Webscale) |
http://mysupport.netapp.com/NOW/download/software/storagegrid_webscale/10.3.0/ Apply Novell SLES Security Patches https://kb.netapp.com/support/index?page=content&id=1014874 |
SnapDrive for Unix |
SnapDrive for Unix uses the affected gethostbyname() function but does not bundle the library - the host OS library must be updated for the fix. |
NetApp VTL |
NetApp VTL has no plans to address this vulnerability. See the EOA announcement for more information. |
StorageGRID9 (9.x and prior) |
Apply Novell SLES Security Patches https://kb.netapp.com/support/index?page=content&id=1014874 |
Workarounds
- StorageGRID/StorageGRID Webscale - Applying Novell SLES Security Patches https://kb.netapp.com/support/index?page=content&id=1014874
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20150127-0001
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20150127 | Initial Public Release |
2.0 | 20150128 | Updated Software Versions and Fixes & Affected Products |
3.0 | 20150128 | Updated Affected Products |
4.0 | 20150128 | Updated Affected Products; Summary reworded |
5.0 | 20150129 | Updated Affected Products, Products Not Affected, & Products With Revised Vulnerability Status |
6.0 | 20150130 | Updated Products With Revised Vulnerability Status & Affected Products; Removed QLogic switch due to EOS |
7.0 | 20150202 | Updated Affected Products, Products Not Affected, & Products With Revised Vulnerability Status |
8.0 | 20150203 | Updated Affected Products & Products With Revised Vulnerability Status |
9.0 | 20150204 | Removed erroneously included component level products |
10.0 | 20150209 | Updated Products Not Affected |
11.0 | 20150210 | Updated Products Not Affected & Software Versions and Fixes; moved RapidData Migration from Affected Products to Solution Products With Revised Vulnerability Status |
12.0 | 20150211 | Updated Affected Products |
13.0 | 20150217 | Corrected ID link |
14.0 | 20150227 | Updated Affected Products |
15.0 | 20150313 | Updated Software Versions and Fixes |
16.0 | 20150320 | Updated Products With Revised Vulnerability Status |
17.0 | 20150409 | Updated Software Versions and Fixes |
18.0 | 20150626 | Added Cluster Network/Management Switches (Cisco) to Software Versions and Fixes |
19.0 | 20160823 | Cisco Data Center Network Manager moved to Products With Revised Vulnerability Status; Cisco MDS, Cisco Nexus 5k/6k, Cisco Data Center Network Manager, NetApp VASA Provider for Clustered Data ONTAP added to Software Versions and Fixes |
20.0 | 20170221 | Fibre Channel Switch (Cisco) moved to Affected Products, Final status |
21.0 | 20180320 | SolidFire Element OS moved to Products Not Affected |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.