02.20.15

Background Information

In early 2015, a significant security vulnerability was found in the glibc package. Glibc is an implementation of the standard C library and is a core part of all our currently supported Linux distributions. A code audit was performed by the Qualys research group and the following security advisory was made available: https://www.qualys.com/research/security-advisories/GHOST-CVE-2015-0235.txt.

Impact

It is called the GHOST vulnerability as it can be triggered by the GetHOST functions. A blog post released by Qualys describes the vulnerability as: “a buffer overflow in the __nss_hostname_digits_dots() function of glibc. This bug can be triggered both locally and remotely via all the gethostbyname*() functions. Applications have access to the DNS resolver primarily through the gethostbyname*() set of functions. These functions convert a hostname into an IP address.”

Resolution

We recommend starting by briefly reading the following articles to understand the changes that have been made and if you manually patch your systems, ensure that you update your glibc library to ensure the vulnerability is patched:

https://access.redhat.com/security/cve/CVE-2015-0235

https://rhn.redhat.com/errata/RHSA-2015-0099.html

If you’re using another Linux distribution, start by looking at the references linked on this page and if you’re in any doubt, please contact your vendor directly for advice:

https://community.qualys.com/blogs/laws-of-vulnerabilities/2015/01/27/the-ghost-vulnerability

The performance of MarkLogic will not be impacted by the patched glibc library, so updating as per the instructions provided by your vendor is recommended.

In addition, we are adding an additional layer of security into the product to shield unpatched systems from this vulnerability. This patch is available immediately for any users who have already upgraded to MarkLogic 8 and we have already patched MarkLogic 6 and 7 and the next available releases (6.0-6 and 7.0-5 at the time of writing) will work to guard against this vulnerability.

For patched releases of the product, if anyone attempts to exploit the vulnerability, the server will terminate the query and throw an exception.

If you run MarkLogic 8 on an unpatched system, you will see the following message when you start MarkLogic on the host:

YYYY-MM-DD HH:MM:SS.sss Warning: Guarding against detected Linux glibc GHOST vulnerability

Additional Information

MarkLogic 8 is available for download at: http://developer.marklogic.com/products.

This website uses cookies.

By continuing to use this website you are giving consent to cookies being used in accordance with the MarkLogic Privacy Statement.