Thursday, 14 May 2015

VENOM Vulnerability

How to Patch and Protect Linux Server against the VENOM Vulnerability # CVE-2015-3456


A very serious security problem has been found in the virtual floppy drive QEMU's code used by many computer virtualization platforms including Xen, KVM, VirtualBox, and the native QEMU client. It is called VENOM vulnerability. How can I fix VENOM vulnerability and protect my Linux server against the attack? How do I verify that my server has been fixed against the VENOM vulnerability?
This is tagged as high severity security bug and it was announced on 13th May 2015. The VENOM vulnerability has existed since 2004, when the virtual Floppy Disk Controller was first added to the QEMU codebase. Since the VENOM vulnerability exists in the hypervisor’s codebase, the vulnerability is agnostic of the host operating system (Linux, Windows, Mac OS, etc.).


What is the VENOM security bug (CVE-2015-3456)?


An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller (FDC) handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the hosting QEMU process.


A list of affected Linux distros


§ RHEL (Red Hat Enterprise Linux) version 5.x, 6.x and 7.x
§ CentOS Linux version 5.x, 6.x and 7.x
§ OpenStack 5 for RHEL 6
§ OpenStack 4 for RHEL 6
§ OpenStack 5 for RHEL 7
§ OpenStack 6 for RHEL 7
§ Red Hat Enterprise Virtualization 3
§ Debian Linux code named stretch, sid, jessie, squeeze, and wheezy [and all other distro based on Debian]
§ SUSE Linux Enterprise Server 10 Service Pack 4 (SLES 10 SP3)
§ SUSE Linux Enterprise Server 10 Service Pack 4 (SLES 10 SP4)
§ SUSE Linux Enterprise Server 11 Service Pack 1 (SLES 11 SP1)
§ SUSE Linux Enterprise Server 11 Service Pack 2 (SLES 11 SP2)
§ SUSE Linux Enterprise Server 11 Service Pack 3 (SLES 11 SP3)
§ SUSE Linux Enterprise Server 12
§ SUSE Linux Enterprise Expanded Support 5, 6 and 7
§ Ubuntu 12.04
§ Ubuntu 14.04
§ Ubuntu 14.10
§ Ubuntu 15.04


Fix the VENOM vulnerability on a CentOS/RHEL/Fedora/Scientific Linux


sudo yum clean all
sudo yum update
Reboot all your virtual machines on those hypervisors.


Fix the VENOM vulnerability on a Debian Linux


sudo apt-get clean
sudo apt-get update
sudo apt-get upgrade
Reboot all your virtual machines on those hypervisors.


Fix the VENOM vulnerability on a Ubuntu Linux


sudo apt-get clean
sudo apt-get update
sudo apt-get upgrade
Reboot all your virtual machines on those hypervisors.

3 comments:

  1. Those three lines are all that are required to start LDAP with TLS on Red Hat and SuSE. ... Good, the Linux client is authenticating to the LDAP server. We give you the flexibility to create secure connections with .. |Training|Job Support|+91-741-626-7887 Email: hr@laymanlearning.com

    ReplyDelete