Differences between revisions 99 and 104 (spanning 5 versions)
Revision 99 as of 2015-01-21 16:37:22
Size: 8814
Comment:
Revision 104 as of 2015-02-05 13:31:30
Size: 9008
Comment: Remove original 7.8 release AMIs
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:
 * [[#7.8|7.8]] (11 January 2015)  * [[#7.8.aws.1|7.8.aws.1]] (28 January 2015)
Line 19: Line 20:
== 7.8 ==
<<Anchor(7.8)>>
== 7.8.aws.1 ==

This release addresses [[https://security-tracker.debian.org/tracker/CVE-2015-0235|CVE 2015-0235]] also known as the "ghost" issue with libc6; it contains the updated libc6 in the base image.
Line 23: Line 25:
|| ap-northeast-1 || ami-48b9a849 || ami-58b7a659 || ami-00b6a701 || ami-52a3b253 ||
|| ap-southeast-1 || ami-bd6d45ef || ami-c56d4597 || ami-8d6d45df || ami-956149c7 ||
|| ap-southeast-2 || ami-d3e68ce9 || ami-6de68c57 || ami-efe68cd5 || ami-15e58f2f ||
|| eu-central-1 || ami-86a9999b || ami-7aa99967 || ami-64a99979 || ami-52ab9b4f ||
|| eu-west-1 || ami-a345c3d4 || ami-5d46c02a || ami-cb47c1bc || ami-8153d5f6 ||
|| sa-east-1 || ami-b90dbfa4 || ami-dd0cbec0 || ami-750dbf68 || ami-4ffb4652 ||
|| us-east-1 || ami-f295e59a || ami-e895e580 || ami-3695e55e || ami-363a495e ||
|| us-west-1 || ami-c7fae582 || ami-f9fbe4bc || ami-7ffae53a || ami-d7f5ea92 ||
|| us-west-2 || ami-3d9cc00d || ami-9f623eaf || ami-01633f31 || ami-2995c919 ||
|| us-gov-west-1 || ami-99c0a6ba || ami-9bc0a6b8 || ami-95c0a6b6 || - ||
|| cn-north-1 || ami-3617850f || - || ami-3417850d || - ||
|| ap-northeast-1 || ami-b25d44b3 || ami-c05e47c1 || ami-e05c45e1 || ami-745c4575 ||
|| ap-southeast-1 || ami-aeb49ffc || ami-c08ba092 || ami-008ba052 || ami-6a8ba038 ||
|| ap-southeast-2 || ami-6b770351 || ami-f17703cb || ami-b777038d || ami-4f770375 ||
|| eu-central-1 || ami-98043785 || ami-c80437d5 || ami-b60437ab || ami-8a043797 ||
|| eu-west-1 || ami-61e56916 || ami-1be06c6c || ami-e7e66a90 || ami-c9e569be ||
|| sa-east-1 || ami-3d8b3720 || ami-6b8b3776 || ami-558b3748 || ami-2f8b3732 ||
|| us-east-1 || ami-e0efab88 || ami-e6eeaa8e || ami-baeda9d2 || ami-74efab1c ||
|| us-west-1 || ami-b4869ff1 || ami-a8b9a0ed || ami-c0b9a085 || ami-70b9a035 ||
|| us-west-2 || ami-431a4273 || ami-051b4335 || ami-f91a42c9 || ami-a31a4293 ||
|| us-gov-west-1 ||ami-d13455f2 || ami-d53455f6 || ami-d73455f4 || - ||
|| cn-north-1 || ami-48029071 || - || ami-5c029065 || - ||
Line 35: Line 37:

A [[ https://lists.debian.org/debian-cloud/2015/01/msg00000.html | GPG signed email ]] of this list is in the Debian-Cloud mailing list archive for your security.
A [[https://lists.debian.org/debian-cloud/2015/01/msg00006.html | GPG signed email ]] of this list is in the Debian-Cloud mailing list archive for your security.

Debian Wheezy (7.x) on AWS EC2

You may wish to use the CloudFormation template and launch your instance with some smart UserData scripts. For some releases you are free to choose the AWS Marketplace AMI, or the AMI that exists in the Debian AMI Account (account number 379101102735). All AMIs shared from the Debian AWS Account and their corresponding EBS snapshots are marked as public so can be inspected by any other AWS user.

SSH username

In line with the security of most Linux distributions on Amazon Web Services, remote root SSH is disabled (as is password authentication). You will need to connect to instances from this AMI as the user admin using your SSH key, and then sudo -i to gain root access.

Please note that a Marketplace image volume cannot be attached to another running instance (For example, to repair a broken /etc/fstab, or /etc/network/interfaces). This is a limitation of all Marketplace images, as described here: Official AWS documentation


7.8.aws.1

This release addresses CVE 2015-0235 also known as the "ghost" issue with libc6; it contains the updated libc6 in the base image.

Region

hvm x86_64 ebs

paravirtual i386 ebs

paravirtual x86_64 ebs

paravirtual x86_64 instance-store

ap-northeast-1

ami-b25d44b3

ami-c05e47c1

ami-e05c45e1

ami-745c4575

ap-southeast-1

ami-aeb49ffc

ami-c08ba092

ami-008ba052

ami-6a8ba038

ap-southeast-2

ami-6b770351

ami-f17703cb

ami-b777038d

ami-4f770375

eu-central-1

ami-98043785

ami-c80437d5

ami-b60437ab

ami-8a043797

eu-west-1

ami-61e56916

ami-1be06c6c

ami-e7e66a90

ami-c9e569be

sa-east-1

ami-3d8b3720

ami-6b8b3776

ami-558b3748

ami-2f8b3732

us-east-1

ami-e0efab88

ami-e6eeaa8e

ami-baeda9d2

ami-74efab1c

us-west-1

ami-b4869ff1

ami-a8b9a0ed

ami-c0b9a085

ami-70b9a035

us-west-2

ami-431a4273

ami-051b4335

ami-f91a42c9

ami-a31a4293

us-gov-west-1

ami-d13455f2

ami-d53455f6

ami-d73455f4

-

cn-north-1

ami-48029071

-

ami-5c029065

-

A GPG signed email of this list is in the Debian-Cloud mailing list archive for your security.


Upgrading from previous 6.x.y releases

As is standard with Debian, a simple apt-get update && apt-get dist-upgrade should bring all packages up to date. There is no need to reinstall, but any ?CloudFormation templates and ?AutoScale Launch Configurations should be tested with and then updated to use the current AMI. It is recommended not to use older point releases.

CloudFormation Template

CloudFormation is a templating system for defining AWS resources - see http://aws.amazon.com/cloudformation/

{
    "AWSTemplateFormatVersion": "2010-09-09",
    "Description": "Debian AMI list, generated 2014-10-27 14:31:41.085276 by James Bromberger, jeb@debian.org",
    "Mappings": {
        "AMImap": {
            "ap-northeast-1": {
                "Wheezy77basei386paravirtualebs": "ami-970b3a96",
                "Wheezy77basex8664hvmebs": "ami-97f1c096",
                "Wheezy77basex8664paravirtualebs": "ami-0f0f3e0e",
                "Wheezy77basex8664paravirtualinstancestore": "ami-21f6c720"
            },
            "ap-southeast-1": {
                "Wheezy77basei386paravirtualebs": "ami-4e20011c",
                "Wheezy77basex8664hvmebs": "ami-d822038a",
                "Wheezy77basex8664paravirtualebs": "ami-70220322",
                "Wheezy77basex8664paravirtualinstancestore": "ami-24240576"
            },
            "ap-southeast-2": {
                "Wheezy77basei386paravirtualebs": "ami-0185e83b",
                "Wheezy77basex8664hvmebs": "ami-ed87ead7",
                "Wheezy77basex8664paravirtualebs": "ami-bd87ea87",
                "Wheezy77basex8664paravirtualinstancestore": "ami-e386ebd9"
            },
            "eu-west-1": {
                "Wheezy77basei386paravirtualebs": "ami-c664cbb1",
                "Wheezy77basex8664hvmebs": "ami-e261ce95",
                "Wheezy77basex8664paravirtualebs": "ami-9c62cdeb",
                "Wheezy77basex8664paravirtualinstancestore": "ami-187fd06f"
            },
            "sa-east-1": {
                "Wheezy77basei386paravirtualebs": "ami-3f7dc922",
                "Wheezy77basex8664hvmebs": "ami-fd7dc9e0",
                "Wheezy77basex8664paravirtualebs": "ami-a97dc9b4",
                "Wheezy77basex8664paravirtualinstancestore": "ami-417eca5c"
            },
            "us-east-1": {
                "Wheezy77basei386paravirtualebs": "ami-0258e26a",
                "Wheezy77basex8664hvmebs": "ami-a458e2cc",
                "Wheezy77basex8664paravirtualebs": "ami-2058e248",
                "Wheezy77basex8664paravirtualinstancestore": "ami-bc4af0d4"
            },
            "us-west-1": {
                "Wheezy77basei386paravirtualebs": "ami-c53d2880",
                "Wheezy77basex8664hvmebs": "ami-6f3f2a2a",
                "Wheezy77basex8664paravirtualebs": "ami-893c29cc",
                "Wheezy77basex8664paravirtualinstancestore": "ami-4b3e2b0e"
            },
            "us-west-2": {
                "Wheezy77basei386paravirtualebs": "ami-677e3157",
                "Wheezy77basex8664hvmebs": "ami-af7b349f",
                "Wheezy77basex8664paravirtualebs": "ami-df7c33ef",
                "Wheezy77basex8664paravirtualinstancestore": "ami-ff7a35cf"
            }
        }
    },
    "Parameters": {
        "InstanceType": {
            "AllowedPattern": "[a-z]+[0-9].[a-z0-9]+",
            "Default": "m3.medium",
            "Description": "Type of EC2 Instance",
            "Type": "String"
        },
        "KeyName": {
            "Description": "SSH Key Name",
            "Type": "String"
        },
        "Release": {
            "AllowedValues": [
                "Wheezy77basei386paravirtualebs",
                "Wheezy77basex8664hvmebs",
                "Wheezy77basex8664paravirtualebs",
                "Wheezy77basex8664paravirtualinstancestore"
            ],
            "Default": "Wheezy75basex8664paravirtualebs",
            "Description": "Release, arch and root filesystem type",
            "Type": "String"
        }
    },
    "Resources": {
        "MyInstance": {
            "Properties": {
                "ImageId": {
                    "Fn::FindInMap": [
                        "AMImap",
                        {
                            "Ref": "AWS::Region"
                        },
                        {
                            "Ref": "Release"
                        }
                    ]
                },
                "InstanceType": {
                    "Ref": "InstanceType"
                },
                "KeyName": {
                    "Ref": "KeyName"
                },
                "SecurityGroups": [
                    {
                        "Ref": "MySecurityGroup"
                    }
                ]
            },
            "Type": "AWS::EC2::Instance"
        },
        "MySecurityGroup": {
            "Properties": {
                "GroupDescription": "Permit inbound SSH",
                "SecurityGroupIngress": [
                    {
                        "CidrIp": "0.0.0.0/0",
                        "FromPort": "22",
                        "IpProtocol": "tcp",
                        "ToPort": "22"
                    }
                ]
            },
            "Type": "AWS::EC2::SecurityGroup"
        }
    }
}

Suggested UserData scripts

As of the 7.3 release, the official Debian !AMIs now support cloud-init. This means you have much more flexibility (and power) in what you can put in your UserData to get your instance to configure. For example, a simple shell script that starts with #!/bin/sh will be executed as previously - so you can chose to enable auto update with the following UserData scripts:

   1 #!/bin/sh
   2 apt-get update && apt-get upgrade -y && apt-get install -y unattended-upgrades python-pip

The unattended-upgrades package is described on UnattendedUpgrades.

Some feature bugs may persist in Cloud-init in Debian 7.3 AMIs; no functionality has been lost, but it appears not all cloud-init directives can be used. Eg: packages, ssh-import-id, apt_update, apt-upgrade.


See also Cloud and Teams/Cloud.