17 FEB 2016
Hi ~okeanos users,
A new critical vulnerability in glibc has recently been discovered. This security issue is a stack-based buffer overflow problem, which can be exploited by malicious users to execute code remotely. This affects all Linux systems.
Because of this, we strongly advise you to update immediately the glibc packages in your operating system and restart your virtual machines immediately after the updates.
In order to update Debian and Debian derivative systems you may execute:
and for CentOS/RHEL:
the ~okeanos ... read more
28 JAN 2015
Hi ~okeanos users,
As some of you might have heard, a new glibc vulnerability has been found. It has been named GHOST (CVE 2015-0235) and affects most Linux systems. You can find a detailed description of this vulnerability here. From the ~okeanos images that we provide at this moment, the affected ones are the following:
- (K)Ubuntu, prior to version 14.04
- Debian, all versions
- CentOS, all versions
- Oracle Linux, all versions
On our part, we have updated our own systems, but you are strongly advised to update your VMs too . ... read more
10 APR 2014
Have you checked your heart lately? Good.
How about your OpenSSL library? No? Well, you should.
There is a rather dangerous OpenSSL bug on the wild, that affects versions 1.0.1 to 1.0.1f (inclusive). Briefly, all services that employ HTTPS and use the buggy OpenSSL library are exposed to sensitive information leaks. Passwords, certificates and just about anything you want to keep private can be stolen. For a more thorough explanation on this subject, we suggest you read this site, which has all the information you need.
The ... read more
14 MAR 2012Microsoft has issued a security update for a critical Windows flaw, also affecting all Windows images offered by ~okeanos (see here for more details).
Please enable Automatic Updates to obtain the latest security fixes that address this issue. An updated Windows Image for ~okeanos will be available soon