![]() | Oracle System Handbook - ISO 7.0 May 2018 Internal/Partner Edition | ||
|
|
![]() |
||||||||||||
Solution Type Technical Instruction Sure Solution 2182530.1 : How-To - Addressing Security Scan Findings on Exadata and SuperCluster
The goal of this document is to assist in determining if one or more identified CVEs apply to an Oracle Exadata or SuperCluster system. Applies to:Oracle SuperCluster M7 Hardware - Version All Versions and laterOracle SuperCluster T5-8 Hardware - Version All Versions and later SPARC SuperCluster T4-4 - Version All Versions and later Exadata X5-2 Hardware - Version All Versions and later Exadata X4-2 Hardware - Version All Versions and later Information in this document applies to any platform. GoalThe goal of this document is to assist in determining if one or more identified CVEs apply to an Oracle Exadata or SuperCluster system. For vulnerabilities affecting Oracle Database Appliances (ODA), see Doc ID 2195990.1. For vulnerabilities affecting the Cisco 4948 switches in Engineered Systems, see Doc ID 2232764.1. For vulnerabilities that do not have a CVE AND require a cipher to be disabled, see Doc ID 2198093.1. For vulnerabilities that do not have a CVE AND required changing the default SNMP community string, see Doc ID 2181438.1. For CVEs specific to a particular application such as Enterprise Manager, also review Doc ID 1074055.1.
SolutionBackground: Security scans show results for two types of vulnerabilities:
ORACLE SUPPORT ENGINEERS This document is intended to be followed by the customer to locate and apply fixes for known vulnerabilities. If a customer has not followed this document, have them do so or assist them with the process listed herein. DO NOT TRANSFER the SR to the Security Certified Group (SCG) if a fix is already available for the vulnerability. Only transfer the SR to the SCG if it meets one or more of the following criteria:
Steps to Address an Identified Vulnerability:
Exadata Including Storage Cells On SuperCluster (Linux OS):
1. Does the vulnerability listed in the report have a CVE associated with it (for example: CVE-2017-1138)? If yes, go to step 5. If no, go to step 2.
2. Does the vulnerability listed in the report have a ELSA associated with it (for example, ELSA-2017-1701)? If yes, go to step 3. If no, skip to step 14.
3. Go to https://linux.oracle.com/pls/apex/f?p=105:21 , enter the ELSA in the search field and click the Go button. The ELSA will appear in the search results.
4. Click the link to the ELSA in the search results then skip to step 11.
5. Open Doc ID 1405320.1.
6. Search the doc for the CVE number. If the CVE appears in the doc review the "Comment Column" for information and instructions on resolving the CVE finding. Also review the "Fixed In" column to determine the Exadata image that the issue was fixed in. If you are on a version below the one listed in this column, it is recommended that you update to this image version. For example, CVE-2008-5161 did not affect Oracle Linux 5 but did affect Oracle Linux 6. The vulnerability was fixed in Exadata image version 11.2.3.3.0. All subsequent images contain the fix. Therefore if your Exadata is on image version 11.2.3.3.0 or higher, this vulnerability does not apply. If your Exadata is on a version below 11.2.3.3.0, then you will need to update to the latest image available for your system. Fix the issue then skip to step 15. If the CVE does not appear in the doc, go to the next step. 7. Go to the following link to determine the Oracle Enterprise Linux Security Advisory (ELSA) that corresponds to the CVE. http://linux.oracle.com/pls/apex/f?p=130:21 Enter the CVE in the "Search" field then click on the "Go" button. If the CVE has an associated ELSA, the CVE will appear in the search results with details of the problem as seen in this example. Go on to the next step. If the CVE does not have an associated ELSA then no results for this CVE search will appear. Skip to step 15.
8. Click on the CVE number. Details about the CVE will appear.
9. In the CVE details, locate the column labeled “Platform”. This lists the Oracle Linux version that the CVE applies to. If your version of Linux is listed in the “Platform” column, then this vulnerability applies and an ELSA will be listed in the "Errata" column. Go to the next step. If the "Superseded By Advisory" has an ELSA listed, refer to that ELSA instead as it is the most current then go to the next step. If your version of Linux is not listed in the “Platform” column, there will be no ELSA. This is because the issue covered by the CVE does not affect your version of Linux. Skip to step 15.
10. Determine what Linux packages are affected by clicking on the Errata number listed in the “Errata” column. This will take you to the ELSA information that lists the Linux packages affected by this vulnerability.
In some cases a vulnerability may affect the customer's version of Linux but a patch was not produced. This can be for a number of reasons. One of the major reasons is that Oracle Linux is based on Red Hat Enterprise Linux (RHEL) and therefore many of the patches we release are based on patches produced by Red Hat. In some cases, Red Hat will not produce a patch because the version of RHEL has reached End-Of-Life and is no longer supported. In other cases, they will not release a patch because the particular build of that package was not affected. If a patch is not available and the customer would like further follow-up, transfer the SR to the SCG.
11. All packages that require updating will be listed, grouped by the version of Oracle Linux and the architecture (i.e. - Oracle Linux 5 (i386), Oracle Linux 6 (x86_64), etc). Locate the list of packages that matches your version of Oracle Linux and the architecture. Not all packages will need to be updated. For example, the development (-devel) or source (-src) packages are not installed on Exadata systems by default.
12. Query the change log for the affected packages to see if the CVE has already been addressed in it. For example, the following command will query the Firefox package to check for the fix for CVE-2017-5428. rpm -q --changelog firefox | grep -i "CVE-2017-5428"
If a result is not returned, then the CVE has not been addressed. Go to the next step. If a result is returned, then the CVE is addressed and is not applicable. Skip to step 15. Why would your security scan show the system is vulnerable to a CVE but the package change log shows that the CVE is fixed? A majority of the Linux packages used by Engineered Systems are unchanged from the standard Oracle Linux distribution. However, sometimes specific critical fixes will be included in current packages rather than including an entirely updated/new package. Consider the following example. Let's say a security scan was done on an Exadata it found the Exadata vulnerable to CVE-2017-1234. This CVE affects Linux kernel versions 4.1.12 and below. The ELSA for this CVE indicates that the fix was first included in kernel-uek-4.1.12-94.4.1. But the kernel version installed on the Exadata is kernel-uek-4.1.12-61.1.33 (a lower version than the one the fix is included in). It is natural to assume that the Exadata kernel does not have the fix. However, a query of the change log shows this CVE has been fixed. Why? Because that particular fix was applied to the lower version kernel without using the all new kernel. The security scanner vendor does not know about this kernel modification that is specific to Engineered Systems. It just knows about the standard Oracle Linux kernel version.
13. Determine whether or not the affected package has an available update and if that package can be updated. DO NOT UPGRADE THE KERNEL ON AN EXADATA SYSTEM USING YUM OR RPM UNLESS TOLD TO DO SO BY ORACLE SUPPORT. If the packages affected are kernel packages, you must wait until an Exadata image with the kernel version specified in the Errata (or higher) is available. Skip to step 15. If the packages affected are glibc packages, see Doc ID 1965525.1 for information on how to update glibc. However, it is highly recommended to wait until an Exadata image with a fixed version of glibc is released. If the packages affected are Java packages, see Doc ID 2069987.1 (compute nodes) and Doc ID 2075464.1 (cell nodes) for instructions. If the packages affected are related to Xen, it is recommended to only update these using Exadata images to avoid problems with deployed VMs. If the packages affected are gnutls packages and: - your Exadata image is version 12.1.2.2.0 or higher, then the gnutls packages can be removed. These packages were removed in version 12.1.2.2.0 and are no longer required. Skip to step 15. - your Exadata image image version is below 12.1.2.2.0, you can update the installed gnutls package(s) via the YUM utility (e.g. - # yum update <packageName>) then skip to step 15. Reference: SR 3-14627268878 If the packages affected are ibutils packages, you must wait until an Exadata image with the updated ibutils package is available. Skip to step 15. For all other packages, update just the package individually using one of the following two methods: - If your Exadata is able to access the internet, you may use the YUM utility as root to update a single package. For example: yum update <packageName> . - If your Exadata is not able to access the internet, you must download the required updated package from the Oracle Public Yum Repository and install it as root using the rpm command. For example: rpm -Uvh <packageName> . Refer to Doc ID 2312778.1 for more information. If you see the following error when updating packages via YUM, Error: Package: exadata-sun-computenode-exact-12.1.2.3.2.160721-1.noarch (@dbupgrade_local_repo)
refer to Doc ID 1617265.1 for resolution. Once you have determined what action to take regarding package updates based on the above information (and update packages is applicable), skip to step 15.
14. If you are at this step then no Oracle documentation regarding this vulnerability is immediately available to you. Please make note of this vulnerability (including the CVE if one is associated) and the components affected (cell nodes, IB switches, etc) the go to the next step.
15. Repeat steps the above steps for each vulnerability. Once all vulnerabilities in the report have been addressed, go to the next step.
16. If any vulnerabilities were noted in step 8, open a Service Request (SR) with Oracle Support and include the list of vulnerabilities that need further research. Please reference any CVE associated with the vulnerabilities. Additionally, you can open an SR if you need further clarification on the applicability of a specific vulnerability recommendation.
Perform the above steps to confirm the customer did not miss anything. If no fix is found, transfer the SR to the SCG using option 5 and noting that this doc was followed.
SuperCluster (Solaris OS): 1. Does the vulnerability listed in the vulnerability report have a CVE associated with it? If yes, go to the next step. If no, go to step 10.
2. Go to Doc ID 1448883.1.
3. Search for the CVE in the doc. If the CVE is listed in the doc, go to the next step. If the CVE is not listed in the doc, go to step 6.
4. In the “Resolution” column will be the version of Solaris that the vulnerability was fixed in. If your version of Solaris is below the version listed, then go to the next step. If your version of Solaris is at or above the version listed, then go to step .
5. Click on the version link in the document. This will take you to a document containing instructions on how to apply the update. Apply the update to fix the vulnerability then go to step 11.
6. Go to Doc ID 2052590.1.
7. Search for the CVE in the doc. If the CVE is listed, download and install the applicable IDR listed in the “Resolution” column then go to step 11. If the CVE is not listed in the doc, go to step 8.
8. Go to Doc ID 2086278.1.
9. Search for the CVE in the doc. If the CVE is listed, read the information for the CVE that applies to your version of Solaris then apply any recommended IDRs. If you cannot find the CVE in the doc, then the CVE is either not applicable to Solaris or has not been addressed yet. Go to the next step.
10. If you are at this step then no Oracle documentation regarding this vulnerability is immediately available to you. Please make note of this vulnerability (including CVE if one is associated) and the components affected (cell nodes, IB switches, etc).
11. Repeat the above steps for each vulnerability.
12. If any vulnerabilities were noted in step 10, open a Service Request (SR) with Oracle Support and include the list of vulnerabilities that need further research. Please reference only CVEs associated with any vulnerabilities. Additionally, you can open an SR if you need further clarification on the applicability of a specific vulnerability recommendation.
Perform the above steps to confirm the customer did not miss anything. If no fix is found, transfer the SR to the SCG using option 5 and noting that this doc was followed.
References<NOTE:2086278.1> - SuperCluster Recommended Custom Incorporations, IDRs, and CVEs Addressed<NOTE:1965525.1> - glibc vulnerability (CVE-2015-0235) patch availability for Oracle Exadata Database Machine <NOTE:2069987.1> - HOWTO: Update JDK on Exadata Database Nodes <NOTE:1448883.1> - Reference Index of CVE IDs and Solaris Patches <NOTE:2052590.1> - Reference Index of CVE IDs and Solaris Security IDRs <NOTE:2075464.1> - HOWTO: Update JDK on Exadata Storage Cell Nodes <NOTE:1405320.1> - Responses to common Exadata security scan findings <NOTE:1617265.1> - Exadata: Missing Dependency of exadata-sun-computenode-exact if manually upgrade RPM <NOTE:1074055.1> - Security Vulnerability FAQ for Oracle Database and Fusion Middleware Products Attachments This solution has no attachment |
||||||||||||
|