OracleVM 3.4:xen (OVMSA-2018-0020) (Meltdown) (Spectre)

high Nessus Plugin ID 107129

概要

遠端 OracleVM 主機缺少一個或多個安全性更新。

說明

遠端 OracleVM 系統缺少可解決重大安全性更新的必要修補程式:

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=9ccc143584e12027a8db854d19ce8a120d22cfac

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- gnttab:版本變更後,請勿盲目釋放狀態頁 (Andrew Cooper) [Orabug:27614581] (CVE-2018-7541)

- 記憶體:請勿暗中取消對 decrease-reservation 的固定 (Andrew Cooper) [Orabug:27614605] (CVE-2018-7540)

- xend:如果 bios 中的 smt 關閉,允許設置拓撲 (Elena Ufimtseva)

- x86/svm:功能不受支援時,清除 CPUID IBPB (Elena Ufimtseva) [Orabug:27416699]

- x86/domain:在 cpuid_policy_changed 之前移動 hvm_vcpu_initialize (Elena Ufimtseva) [Orabug:
27416699]

- x86、amd_ucode:支援將多個容器文件附加在一起 (Aravind Gopalakrishnan) [Orabug:27416699]

- x86/intel:將預設調控器更改為性能 (Joao Martins)

- x86/cpuidle:勘誤表 AAJ72 導致深層 C 狀態停用 (Joao Martins) [Orabug:27614625]

- 恢復「將最大 cstate 設置為1」(Joao Martins) [Orabug:27614625]

- x86/cpuidle:添加新的 CPU 系列 (Jan Beulich) [Orabug:27614625]

- x86/Intel:Broadwell 沒有 PKG_C[8,9,10]_RESIDENCY MSR (Jan Beulich) [Orabug:27614625]

- x86:支援更新的 Intel CPU 型號 (Jan Beulich) [Orabug:27614625]

- mwait-idle:添加 KBL 支援 (Len Brown) [Orabug:
27614625]

- mwait-idle:添加 SKX 支援 (Len Brown)&nbsp [Orabug:
27614625]

- mwait_idle:Skylake 客戶端支援 (Len Brown) [Orabug:27614625]

- x86:支援更新的 Intel CPU 型號 (Jan Beulich) [Orabug:27614625]

- x86/idle:更新以納入其他套件/核心駐留 MSR (Jan Beulich) [Orabug:27614625]

- mwait-idle:支援其他 Broadwell 模型 (Len Brown) [Orabug:27614625]

- x86/mwait-idle:Broadwell 支援 (Len Brown) [Orabug:27614625]

- x86/mwait-idle:停用 Baytrail 核心和 C6 auto-demotion 模塊 (Len Brown) [Orabug:27614625]

- mwait-idle:添加 CPU 型號 54 (Atom N2000 系列) (Jan Kiszka) [Orabug:27614625]

- mwait-idle:支援 Bay Trail (Len Brown) [Orabug:
27614625]

- mwait-idle:允許 Bay Trail 中稀疏的子狀態數量 (Len Brown) [Orabug:27614625]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=c837c35e1c04791a50f930926ba815ca5b4d3661

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend:客體重新啟動時還原 smt 參數 (Elena Ufimtseva) [Orabug:27574191]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=f36f7903ae0886ab4ef7e3e01c83c9dba819537b

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86/spec_ctrl:修復 SPEC_CTRL_ENTRY_FROM_INTR_IST 中的數個錯誤 (Andrew Cooper) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86:允許更輕鬆地停用 BTI 緩解措施 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86/boot:對 NMI-safe 進行替代修補 (Andrew Cooper) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- xen/cmdline:修復未經裝飾的值的 parse_boolean (Andrew Cooper)[Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 稍微優化上下文切換代碼 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 將 init_speculation_mitigations 更新至上游版本 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86/entry:避免在 NMI/#MC 路徑中使用替代項 (Andrew Cooper) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 將 RSB 相關實現更新至上游版本 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=bdecffda647e17f8aaeb4057bd1064236075bc9c

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend:如果啟用安全啟動,請勿寫入 pci 配置空間 (Elena Ufimtseva) [Orabug:27533309]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=46aa4f995b266e9dc0bce98b448423c5fdc79fde

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- hvmloader:修正 init_vnuma_info 失敗時的 nr_vnodes (Annie Li)

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=1fb819ca1b801af1f59983f34776501336a57979

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- 如果目標不允許運行 pv 客體,遷移將失敗 (Annie Li) [Orabug:27465310]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=dfc241a5b6a952bde385b1d68ef42acf8f80302c

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86:洩漏 CPUID.7、EDX.26->27 和 CPUID.0x80000008、EBX.12 (redux) (Konrad Rzeszutek Wilk) [Orabug:
27445667]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=d5afa57c42732dc35a572582099c67ee3c397434

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- 預設情況下,啟用在 OVM3.4.4 上建立 pv 客體 (Annie Li) [Orabug:27424482]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=619dd3aa6aac97dbc9f23fdae3d6fd6dfab8a0da

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xen/x86:確保在啟用陷阱的情況下呼叫 identify_cpu (Joao Martins) [Orabug:27393237]

- xend:禁止 pv 客體運行 (Joao Martins) [Orabug:27370330]

- hvmloader、x86/hvm、domctl:枚舉基於 vcpu_to_vnode 的 apicid (Joao Martins) [Orabug:27119689]

- xend:有條件地針對 vnuma auto 使用 dom0 vcpus (Joao Martins)

- x86/Spectre:如果編譯器支援不可用,則將 thunk 設置為 THUNK_NONE (Boris Ostrovsky) [Orabug:
27375704]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=1d2270f50ef2b1b22b8f6ee7a9b571ea96f7f37b

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xen:dracut 和 microcode_ctl RPMs 無依存關係 (Boris Ostrovsky) [Orabug:27409734]

解決方案

更新受影響的 xen / xen-tools 套件。

另請參閱

http://www.nessus.org/u?884f76d4

Plugin 詳細資訊

嚴重性: High

ID: 107129

檔案名稱: oraclevm_OVMSA-2018-0020.nasl

版本: 3.9

類型: local

已發布: 2018/3/5

已更新: 2019/9/27

支援的感應器: Nessus

風險資訊

VPR

風險因素: High

分數: 8.4

CVSS v2

風險因素: Medium

基本分數: 6.1

時間分數: 5.3

媒介: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:C

CVSS v3

風險因素: High

基本分數: 8.8

時間分數: 8.4

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:H/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4

必要的 KB 項目: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2018/3/2

弱點發布日期: 2018/1/4

可惡意利用

CANVAS (CANVAS)

參考資訊

CVE: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-7540, CVE-2018-7541

IAVA: 2018-A-0019, 2018-A-0020