Lucene search

K
veeamVeeam softwareVEEAM:KB3109
HistoryMar 02, 2020 - 12:00 a.m.

List of Security Fixes and Improvements in Veeam Agent for Linux

2020-03-0200:00:00
Veeam software
www.veeam.com
11

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

9.5%

Purpose

This article describes all security-related fixes and improvements introduced in each release or update of Veeam Agent for Linux.

The goal of this article is to provide our customers’ security and compliance teams with the detailed information on security improvements between releases, in order to help them make an informed decision on whether it is critical to upgrade from their current Veeam Agent for Linux version to a latter one.

Security Fixes and Improvements

6.2.0.101

6.1.0.1498

6.0.2.1168

  • OpenSSL Library updated to the newest version (1.0.2zg).

5.0.2.4707

  • OpenSSL was updated to v1.0.2zi.
  • liblz4 was updated to v1.9.4.
  • zlib was updated to v1.2.13.
  • PuTTY was updated to 0.80.

5.0.0.4318

  • Addressed an issue with insecure default permissions of files created in /tmp
  • LZ4 compression library version has been updated to version 1.9.2.

4.0.1.2365

  • Sensitive information used by managed Linux agent may get logged in the Linux operating system logs.
  • Creating an SMB repository using CLI command causes plain text password to be logged in the Veeam debug log.

4.0.0.1961

  • An issue of insecure file permissions was addressed (vulnerability reported by RACK911 Labs).
  • OpenSSL was updated to version 1.0.2t.

More Information

As we’re establishing this new process, we appreciate any feedback on the content or format of this KB article. Please let us know in the corresponding topic on the Veeam Community Forums. If your feedback is too sensitive to be shared publicly, please submit it by opening a support case. We highly appreciate your collaboration!

To submit feedback regarding this article, please click this link: Send Article Feedback
To report a typo on this page, highlight the typo with your mouse and press CTRL + Enter.

Affected configurations

Vulners
Node
veeamveeam_backup_for_google_cloudMatch6.2
OR
veeamveeam_backup_for_google_cloudMatch6.1
OR
veeamveeam_backup_for_google_cloudMatch6.0
OR
veeamveeam_backup_for_google_cloudMatch5.0
OR
veeamveeam_backup_for_google_cloudMatch4.0
VendorProductVersionCPE
veeamveeam_backup_for_google_cloud6.2cpe:2.3:a:veeam:veeam_backup_for_google_cloud:6.2:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud6.1cpe:2.3:a:veeam:veeam_backup_for_google_cloud:6.1:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud6.0cpe:2.3:a:veeam:veeam_backup_for_google_cloud:6.0:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud5.0cpe:2.3:a:veeam:veeam_backup_for_google_cloud:5.0:*:*:*:*:*:*:*
veeamveeam_backup_for_google_cloud4.0cpe:2.3:a:veeam:veeam_backup_for_google_cloud:4.0:*:*:*:*:*:*:*

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

9.5%

Related for VEEAM:KB3109