{"id":348,"date":"2015-05-14T09:38:34","date_gmt":"2015-05-14T09:38:34","guid":{"rendered":"http:\/\/kb.veeble.org\/?p=348"},"modified":"2025-04-08T16:06:18","modified_gmt":"2025-04-08T10:36:18","slug":"venom-qemu-vulnerability","status":"publish","type":"post","link":"https:\/\/www.veeble.com\/kb\/venom-qemu-vulnerability\/","title":{"rendered":"VENOM: QEMU vulnerability"},"content":{"rendered":"\n<p>Red Hat Product Security is aware of a &#8216;buffer overflow vulnerability. This is what affects the Floppy Disk Controller (FDC) emulation. It is implemented in the QEMU component of the KVM\/QEMU and Xen hypervisors. The vulnerability is now called <a href=\"https:\/\/en.wikipedia.org\/wiki\/VENOM\" target=\"_blank\" rel=\"noopener\">VENOM <\/a>and it was discovered by Jason Geffner of CrowdStrike, Inc. The vulnerability is said to have an important impact.<\/p>\n\n\n\n<p><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"what-is-qemu\">What is QEMU?<\/h3>\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/QEMU\" target=\"_blank\" rel=\"noopener\">QEMU<\/a> is a generic and open source machine emulator and virtualizer. It is incorporated in some Red Hat products as a foundation and hardware emulation layer. This is used for running virtual machines under the Xen and KVM\/QEMU hypervisors.<\/p>\n\n\n\n<p><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"impact\"><strong>Impact<\/strong><\/h3>\n\n\n<p>As mentioned before, using this vulnerability the privileged guest user in the host can destroy the guest or can execute arbitrary code on the host. And it may be with the privileges of the host&#8217;s QEMU process corresponding to the guest. Please note that this issue is exploitable even if the guest does not explicitly have a virtual floppy disk configured and attached. The problem exists in the Floppy Disk Controller. It is the one initialized for every x86 and x86_64 guest. And is regardless of the configuration and cannot be removed or disabled.<\/p>\n\n\n\n<p>As of now, there is no known exploit that would make use of this vulnerability. The sVirt and seccomp functionalities are used to restrict the host&#8217;s QEMU process privileges. The resource access might mitigate the impact of successful exploitation of this issue. Avoid granting untrusted users administrator privileges within guests can prevent the issue to some extent.<\/p>\n\n\n\n<p>The interesting fact is that the flaw does not require the floppy device to be present in \/dev\/ within the guest. This is because the Floppy Disk Controller (FDC) is still present in the system. User-level access to a guest with sufficient permissions to talk to FDC I\/O ports (i.e. the root or a privileged user on Linux or virtually any user on a Windows guest) is all that is required to exploit this flaw. To mitigate the overall risk of this vulnerability, only grant privileged guest access to trusted users.<br>All Red Hat products that include QEMU are vulnerable to this flaw. Affected Red Hat products are the following:<br><a href=\"http:\/\/kb.veeble.org\/wp-content\/uploads\/2015\/05\/redhat.png\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"798\" height=\"349\" class=\"alignnone wp-image-350 size-full\" src=\"http:\/\/kb.veeble.org\/wp-content\/uploads\/2015\/05\/redhat.png\" alt=\"redhat\" srcset=\"https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/redhat.png 798w, https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/redhat-300x131.png 300w\" sizes=\"auto, (max-width: 798px) 100vw, 798px\" \/><\/a><br><\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"resolution\"><strong>Resolution<\/strong><\/h3>\n\n\n<p>There are a few steps to eliminate the possibility of exploitation. Install the updated QEMU, KVM, or Xen packages. This is available through the advisories listed in the above table.<\/p>\n\n\n\n<p>You can install the updates using the yum package manager as follows:<\/p>\n\n\n\n<p>root# yum update<br>If you want to update the QEMU package (or the relevant package for your system) and its dependencies, use, for example:<\/p>\n\n\n\n<p>root# yum update qemu-kvm<br>Following the update, power off and start up the guests (virtual machines) for the update to take effect. It is also possible to migrate guests away from the affected host, update the host, and then migrate the guests back. Please note that it is not enough to restart the guests because a restarted guest would continue running using the same (old, not updated) QEMU binary.<\/p>\n\n\n\n<p>That&#8217;s all!<\/p>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-call-to-action uagb-block-c9a4a72f wp-block-button\"><div class=\"uagb-cta__wrap\"><h3 class=\"uagb-cta__title\">Scale Your Node.js Applications Effortlessly with Veeble&#8217;s Hosting<\/h3><p class=\"uagb-cta__desc\">Grow without limits! Auto-scaling, global reach, and top security. Experience reliable, high-performance Node.js hosting.<\/p><\/div><div class=\"uagb-cta__buttons\"><a href=\"https:\/\/www.veeble.com\/in\/nodejs-hosting\/\" class=\"uagb-cta__button-link-wrapper wp-block-button__link\" target=\"_blank\" rel=\"noopener noreferrer\">Explore Node.js Plans<svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M504.3 273.6l-112.1 104c-6.992 6.484-17.18 8.218-25.94 4.406c-8.758-3.812-14.42-12.45-14.42-21.1L351.9 288H32C14.33 288 .0002 273.7 .0002 255.1S14.33 224 32 224h319.9l0-72c0-9.547 5.66-18.19 14.42-22c8.754-3.809 18.95-2.075 25.94 4.41l112.1 104C514.6 247.9 514.6 264.1 504.3 273.6z\"><\/path><\/svg><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Red Hat Product Security is aware of a &#8216;buffer overflow vulnerability. This is what affects the Floppy Disk Controller (FDC) emulation. It is implemented [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":7394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5],"tags":[],"class_list":["post-348","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux"],"uagb_featured_image_src":{"full":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/VENOM-QEMU-vulnerability.jpg",1366,768,false],"thumbnail":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/VENOM-QEMU-vulnerability-150x150.jpg",150,150,true],"medium":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/VENOM-QEMU-vulnerability-300x169.jpg",300,169,true],"medium_large":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/VENOM-QEMU-vulnerability-768x432.jpg",768,432,true],"large":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/VENOM-QEMU-vulnerability-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/VENOM-QEMU-vulnerability.jpg",1366,768,false],"2048x2048":["https:\/\/www.veeble.com\/kb\/wp-content\/uploads\/2015\/05\/VENOM-QEMU-vulnerability.jpg",1366,768,false]},"uagb_author_info":{"display_name":"Vipin Raj","author_link":"https:\/\/www.veeble.com\/kb\/author\/vipin\/"},"uagb_comment_info":1,"uagb_excerpt":"Red Hat Product Security is aware of a &#8216;buffer overflow vulnerability. This is what affects the Floppy Disk Controller (FDC) emulation. It is implemented [&hellip;]","_links":{"self":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/348","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/comments?post=348"}],"version-history":[{"count":8,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/348\/revisions"}],"predecessor-version":[{"id":8516,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/posts\/348\/revisions\/8516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/media\/7394"}],"wp:attachment":[{"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/media?parent=348"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/categories?post=348"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.veeble.com\/kb\/wp-json\/wp\/v2\/tags?post=348"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}