Sun Microsystems, Inc.  Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition
   Home | Current Systems | Former STK Products | EOL Systems | Components | General Info | Search | Feedback

Asset ID: 1-79-1683606.1
Update Date:2016-10-11
Keywords:

Solution Type  Predictive Self-Healing Sure

Solution  1683606.1 :   CVE-2014-0224 Patch Availability Document for Oracle Big Data Appliance  


Related Items
  • Big Data Appliance Integrated Software
  •  
  • Big Data Appliance Hardware
  •  
Related Categories
  • PLA-Support>Eng Systems>BDA>Big Data Appliance>DB: BDA_EST
  •  




In this Document
Purpose
Scope
Details
 Affected BDA Releases
 Instructions to check BDA Release and OS Version
 Download and Install Latest version of OpenSSL rpm in OEL
 Download Latest patched version of OpenSSL
 Upgrade OpenSSL on BDA Cluster
 Post RPM Upgrade Steps
 Verify Openssl  Version
 Hdfs Cluster Restart


Applies to:

Big Data Appliance Hardware - Version All Versions and later
Big Data Appliance Integrated Software - Version 2.1.0 to 4.0 [Release 2.1 to 4.0]
Linux x86-64

Purpose

This document provides details about affected versions of Oracle Big Data Appliance(BDA) and instructions on how to update OEL with OpenSSL rpms outside of Big Data Appliance updates.

Scope

This document applies to Oracle Big Data Appliance(BDA)

Details

Oracle has released the following El-errata related to OpenSSL:

 https://oss.oracle.com/pipermail/el-errata/2014-June/004170.html
 https://oss.oracle.com/pipermail/el-errata/2014-June/004173.html

Affected BDA Releases

All current releases of BDA V2.* to V2.5 and v3.0.*  to V3.0.1 are affected by CVE-2014-0224 vulnerability.

Instructions to check BDA Release and OS Version

These steps are the same for HDFS or NoSQL Cluster installed on BDA

1) Log into Node01 of the BDA cluster as root user

2) Check BDA image and OS details by executing imageinfo command

a) Sample output for BDA 2.* with OEL6 OS

# imageinfo
Big Data Appliance Image Info

IMAGE_VERSION             : 2.*.0
IMAGE_CREATION_DATE       : Thu Mar 20 21:14:56 UTC 2014
IMAGE_LABEL               : BDA_2.*.0_LINUX.X64_RELEASE
LINUX_VERSION             : Oracle Linux Server release 6.4
KERNEL_VERSION            : 2.6.39-400.209.1.el6uek.x86_64
BDA_RPM_VERSION           : bda-2.*.0-1.el6.x86_64
OFED_VERSION              : OFED-IOV-1.5.5-2.0.0088
JDK_VERSION               : jdk-1.7.0_25-fcs.x86_64
 

OR

b) Sample output for BDA 2.* with OEL5 OS

# imageinfo

Big Data Appliance Image Info

IMAGE_VERSION             : 2.*.0
IMAGE_CREATION_DATE       : Mon Nov 18 14:01:20 PST 2013
IMAGE_LABEL               : BDA_2.*.1_LINUX.X64_RELEASE
IMAGE_VERSION             : 2.*.1
LINUX_VERSION             : Oracle Linux Server release 5.8
KERNEL_VERSION            : 2.6.32-200.21.1.el5uek
BDA_RPM_VERSION           : bda-2.*.1-1
OFED_VERSION              : OFED-IOV-1.5.5-1.0.0120
JDK_VERSION               : jdk-1.7.0_25-fcs

3) Check the version of openssl rpm installed. dcli can used to check the openssl rpm release on all nodes in the cluster

# rpm -qa | grep -i '^openssl'

Note:- dcli can be used to check the openssl rpm release on all nodes in the cluster

dcli -C "rpm -qa | grep -i '^openssl'"

a) Sample output from OEL6 OS

# dcli -C "rpm -qa | grep -i '^openssl'"
<private-ip of node>: openssl-1.0.1e-16.el6_5.7.x86_64
<private-ip of node>: openssl098e-0.9.8e-17.0.1.el6_2.2.x86_64
...

OR

b) Sample output from OEL5 OS 

# dcli -C 'rpm -qa --qf "%{n}-%{v}-%{r}.%{arch}\n" | grep "^openssl"'
<private-ip of node>: openssl-0.9.8e-22.el5_8.4.i686
<private-ip of node>: openssl-0.9.8e-22.el5_8.4.x86_64
......... 

Note:- Package versions earlier then the package versions shown below are affected

Download and Install Latest version of OpenSSL rpm in OEL

Download Latest patched version of OpenSSL

Latest openssl-<version>.rpm can be downloaded from
Free (Public Yum): http://public-yum.oracle.com/
OR
Paid (ULN): https://linux.oracle.com/

For OEL5, the latest openssl rpms that contain the fix for CVE-2014-0224 vulnerability are ....
openssl-0.9.8e-27.el5_10.3.i686.rpm
openssl-0.9.8e-27.el5_10.3.x86_64.rpm

For OEL6, the latest openssl rpms that contain the fix for CVE-2014-0224 vulnerability are ....
openssl098e-0.9.8e-18.0.1.el6_5.2.x86_64.rpm
openssl-1.0.1e-16.el6_5.14.x86_64.rpm

Upgrade OpenSSL on BDA Cluster

These steps are the same for a HDFS or NoSQL Cluster installed on BDA.

Note:- If more than one cluster is installed on a rack, then please execute below steps on all clusters in the rack .

1) Log into Node01 of the BDA cluster as root user

2) Depending on the OS on BDA, copy the needed OEL5 or OEL6 rpm's to node01 into /tmp

a) Sample output from BDA Cluster with OEL6 OS

# ls -l /tmp/openssl*
-rw-r--r-- 1 root root  779168 Jun 17 15:37 /tmp/openssl098e-0.9.8e-18.0.1.el6_5.2.x86_64.rpm
-rw-r--r-- 1 root root 1578748 Jun 17 15:37 /tmp/openssl-1.0.1e-16.el6_5.14.x86_64.rpm

OR

b) Sample output from BDA Cluster with OEL5 OS

# ls -l /tmp/openssl*
-rw-r--r-- 1 root root 1524948 Jun 17 15:37 /tmp/openssl-0.9.8e-27.el5_10.3.i686.rpm
-rw-r--r-- 1 root root 1525580 Jun 17 15:37 /tmp/openssl-0.9.8e-27.el5_10.3.x86_64.rpm
 

3) Use dcli to copy the ssl rpm to all nodes in the cluster

a) Commands for OEL6 OS

dcli -C mkdir /root/rpms
dcli -C ls -ld  /root/rpms
dcli -C -f /tmp/openssl098e-0.9.8e-18.0.1.el6_5.2.x86_64.rpm  -d /root/rpms/
dcli -C -f /tmp/openssl-1.0.1e-16.el6_5.14.x86_64.rpm  -d /root/rpms/
dcli -C ls -l /root/rpms

Sample output from BDA Cluster with OEL6 OS

# dcli -C mkdir /root/rpms
# dcli -C ls -ld  /root/rpms
<private-ip of node>: drwxr-xr-x 2 root root 4096 Jun 17 15:40 /root/rpms
.....
# dcli -C -f /tmp/openssl098e-0.9.8e-18.0.1.el6_5.2.x86_64.rpm  -d /root/rpms/
# dcli -C -f /tmp/openssl-1.0.1e-16.el6_5.14.x86_64.rpm  -d /root/rpms/
# dcli -C ls -l /root/rpms
<private-ip of node>: total 2308
<private-ip of node>: -rw-r--r-- 1 root root  779168 Jun 17 15:53 openssl098e-0.9.8e-18.0.1.el6_5.2.x86_64.rpm
<private-ip of node>: -rw-r--r-- 1 root root 1578748 Jun 17 15:53 openssl-1.0.1e-16.el6_5.14.x86_64.rpm
...............................

OR

b) Commands for OEL5 OS

dcli -C mkdir /root/rpms
dcli -C ls -ld  /root/rpms
dcli -C -f /tmp/openssl-0.9.8e-27.el5_10.3.i686.rpm  -d /root/rpms/
dcli -C -f /tmp/openssl-0.9.8e-27.el5_10.3.x86_64.rpm  -d /root/rpms/
dcli -C ls -l /root/rpms

Sample output from BDA Cluster with OEL5 OS

# dcli -C mkdir /root/rpms
# dcli -C ls -ld  /root/rpms
<private-ip of node>:  drwxr-xr-x 2 root root 4096 Jun 17 17:14 /root/rpms
.....
# dcli -C -f /tmp/openssl-0.9.8e-27.el5_10.3.i686.rpm  -d /root/rpms/
# dcli -C -f /tmp/openssl-0.9.8e-27.el5_10.3.x86_64.rpm  -d /root/rpms/
# dcli -C ls -l /root/rpms
<private-ip of node>: total 2992
<private-ip of node>: -rw-r--r-- 1 root root 1524948 Jun 17 17:15 openssl-0.9.8e-27.el5_10.3.i686.rpm
<private-ip of node>: -rw-r--r-- 1 root root 1525580 Jun 17 17:15 openssl-0.9.8e-27.el5_10.3.x86_64.rpm
...............................

4) Upgrade the ssl rpm on all the nodes in the cluster

a) Commands for OEL6 OS

 dcli -C rpm -Uvh /root/rpms/openssl-1.0.1e-16.el6_5.14.x86_64.rpm /root/rpms/openssl098e-0.9.8e-18.0.1.el6_5.2.x86_64.rpm

Sample output

<private-ip of node>: Preparing...                ##################################################
<private-ip of node>: openssl                     ##################################################
<private-ip of node>: openssl098e              ##################################################
.........

OR

b) Commands for OEL5 OS

dcli -C rpm -Uvh /root/rpms/openssl-0.9.8e-22.el5_8.4.i686 /root/rpms/openssl-0.9.8e-22.el5_8.4.x86_64

 Sample output

<private-ip of node>: Preparing...                ##################################################
<private-ip of node>: openssl                     ##################################################
<private-ip of node>: openssl                    ##################################################
.........

Note:- Below warning maybe thrown during upgrade of openssl rpm on OEL5 . These warnings are harmless and can be ignored.

warning: /etc/pki/tls/certs/ca-bundle.crt created as /etc/pki/tls/certs/ca-bundle.crt.rpmnew

Post RPM Upgrade Steps

Verify Openssl  Version

Check if the openssl rpm is updated correctly

a) Output for OEL6 OS

# dcli -C "rpm -qa | grep -i '^openssl'"

<private-ip of node>: openssl-1.0.1e-16.el6_5.14.x86_64
<private-ip of node>: openssl098e-0.9.8e-17.0.1.el6_2.2.x86_64
...

OR

b) Output for OEL5 OS

# dcli -C 'rpm -qa --qf "%{n}-%{v}-%{r}.%{arch}\n" | grep "^openssl"'

<private-ip of node>: openssl-0.9.8e-27.el5_10.3.i686
<private-ip of node>: openssl-0.9.8e-27.el5_10.3.x86_64
...

Hdfs Cluster Restart

If network encryption is enabled on the HDFS cluster or for any services on the HDFS cluster then the cluster (or those particular services) should be restarted.

To restart the HDFS cluster or a particular service/s follow below steps

1) Log into Cloudera Manager(CM) UI as admin user 

CM resides on node03 of the primary rack and can be accessed using http://<node3-name>:7180

2) Start the BDA cluster or just the services needed

a) To restart 'All Services' or the complete cluster

Services > All Services > Actions > ReStart

b) To restart a specific service

Services > All Services > Choose the Service to restart


Attachments
This solution has no attachment
  Copyright © 2018 Oracle, Inc.  All rights reserved.
 Feedback