OracleVM 3.4:xen (OVMSA-2018-0021) (Meltdown) (Spectre)

high Nessus Plugin ID 107130

概要

遠端 OracleVM 主機缺少一個或多個安全性更新。

說明

遠端 OracleVM 系統缺少可解決重大安全性更新的必要修補程式:

- BUILDINFO:xen commit=b2a6db11ced11291a472bc1bda20ce329eda4d66

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- gnttab:版本變更後,不要盲目釋放狀態頁 (Andrew Cooper)&nbsp [Orabug:27571750]&nbsp (CVE-2018-7541)

- 記憶體:不要暗中取消對 decrease-reservation 的固定 (Andrew Cooper)&nbsp [Orabug:27571737]&nbsp (CVE-2018-7540)

- BUILDINFO:xen commit=873b8236e886daa3c26dae28d0c1c53d88447dc0

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend:如果啟用安全啟動,請勿寫入 pci 配置空間 (Elena Ufimtseva) [Orabug:27533309]

- BUILDINFO:xen commit=81602116e75b6bbc519366b242c71888aa1b1673

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86/spec_ctrl:修復 SPEC_CTRL_ENTRY_FROM_INTR_IST 中的數個錯誤 (Andrew Cooper)&nbsp [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86:允許更輕鬆地停用 BTI 緩解措施 (Zhenzhong Duan) [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86/boot:對 NMI-safe 進行替代修補 (Andrew Cooper) [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- xen/cmdline:修復未經裝飾的值的 parse_boolean (Andrew Cooper)&nbsp [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 稍微優化環境切換代碼 (Zhenzhong Duan)&nbsp [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 將 init_speculation_mitigations 更新至上游版本 (Zhenzhong Duan)&nbsp [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86/entry:避免在 NMI/#MC 路徑中使用替代項 (Andrew Cooper)&nbsp [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 將 RSB 相關實現更新至上游版本 (Zhenzhong Duan)&nbsp [Orabug:27553376]&nbsp (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- BUILDINFO:xen commit=c6a2fe8d72a3eba01b22cbe495e60cb6837fe8d0

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86:洩漏 CPUID.7、EDX.26->27 和 CPUID.0x80000008、EBX.12 (redux) (Konrad Rzeszutek Wilk) [Orabug:
27445678]

- BUILDINFO:xen commit=9657d91fcbf49798d2c5135866e1947113d536dc

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86/Spectre:如果編譯器支援不可用,則將 thunk 設置為 THUNK_NONE (Boris Ostrovsky) [Orabug:
27375688]

- BUILDINFO:xen commit=4e5826dfcb56d3a868a9934646989f8483f03b3c

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:傳統 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xen:dracut 和 microcode_ctl RPMs 無依存關係 (Boris Ostrovsky) [Orabug:27409718]

解決方案

更新受影響的 xen / xen-tools 套件。

另請參閱

http://www.nessus.org/u?de7c508d

Plugin 詳細資訊

嚴重性: High

ID: 107130

檔案名稱: oraclevm_OVMSA-2018-0021.nasl

版本: 3.9

類型: local

已發布: 2018/3/5

已更新: 2019/9/27

支援的感應器: Nessus

風險資訊

VPR

風險因素: High

分數: 8.4

CVSS v2

風險因素: Medium

基本分數: 6.1

時間分數: 5.3

媒介: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:C

CVSS v3

風險因素: High

基本分數: 8.8

時間分數: 8.4

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:H/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4, p-cpe:/a:oracle:vm:xen

必要的 KB 項目: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2018/3/2

弱點發布日期: 2018/1/4

可惡意利用

CANVAS (CANVAS)

參考資訊

CVE: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-7540, CVE-2018-7541

IAVA: 2018-A-0019, 2018-A-0020