Oracle VENOM Vulnerability Patch Released
Date: 19 May 2015
The purpose of this advisory is to bring attention to a patch released by Oracle to address a critical vulnerability affecting multiple virtual platforms.
Oracle has released a patch to address the critical vulnerability known as VENOM affecting multiple products they offer.
The Quick Emulator (QEMU) virtual Floppy Disk controller (FDC) code is vulnerable to an attacker escaping from the virtual machine guest system and potentially obtaining code-execution access to the host. Since the FDC module is part of the hypervisor, the vulnerability is indifferent to the host operating system. An attacker would need administrative or root privileges in the guest operating system to exploit this vulnerability.
CVE Reference: CVE-2015-3456
CCIRC recommends that owner/operators who utilize virtual environments based on Oracle products which utilize QEMU, test and deploy the appropriate update to affected platforms.
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: