Oracle Linux 7 : libvirt (ELSA-2019-4714) (MDSUM/RIDL) (MFBDS/RIDL/ZombieLoad) (MLPDS/RIDL) (MSBDS/Fallout)

high Nessus Plugin ID 126674
新推出!Plugin 嚴重性目前使用 CVSS v3

計算 Plugin 嚴重性已更新為預設使用 CVSS v3 沒有 CVSS v3 評分的 Plugin 會回歸到以 CVSS v2 計算嚴重性。您可在設定下拉式選單中切換顯示嚴重性的喜好設定

Synopsis

遠端 Oracle Linux 主機缺少一個或多個安全性更新。

描述

變更描述: [5.0.0-9.el7] - qemu:從 virCaps 結構中移除 cpuhostmask 和 cpuguestmask (Wim ten Have) [Orabug: 29956508] [5.0.0-8.el7] - api:在唯讀連接上禁止 virDomainSaveImageGetXMLDesc (J&aacute n Tomko) [Orabug: 29955742]{CVE-2019-10161} - domain:對已儲存影像 xml 定義明顯旗標 (Eric Blake) [Orabug: 29955742] - api:在唯讀連接上禁止 virDomainManagedSaveDefineXML (J&aacute n Tomko) [Orabug: 29955742]{CVE-2019-10166} - api:在唯讀連接上禁止 virConnectGetDomainCapabilities (J&aacute n Tomko) [Orabug: 29955742]{CVE-2019-10167} - api:在唯讀連接上禁止 virConnect*HypervisorCPU (J&aacute n Tomko) [Orabug: 29955742]{CVE-2019-10168} [5.0.0-7.el7] - cpu_map:定義 md-clear CPUID 位元 (Jiri Denemark) [Orabug: 29874181] {CVE-2018-12126}{CVE-2018-12127}{CVE-2018-12130}{CVE-2019-11091} [5.0.0-6.el7] - qemu:驅動程式將私有鎖改新增到 auto-tune hugepage (Wim ten Have) [Orabug: 29809943] [5.0.0-5.el7] - qemu:停用 vNUMA 目標的 setmem 變更要求 (Wim ten Have) [Orabug: 29797366] - domain:停用 vNUMA 客體的 memballoon 記憶體配置支援 (Wim ten Have) [Orabug: 29797366] - qemu:驅動程式更改以將 vNUMA setmaxmem 變更要求作為目標 (Wim ten Have) [Orabug: 29749852] - domain:新增 vNUMA 客體的網域記憶體配置支援 (Wim ten Have) [Orabug: 29749852] - logging:將通訊端限制為 0600 模式 (Daniel P. Berrang&eacute ) [Orabug: 29861433]{CVE-2019-10132} - locking:將通訊端限制為 0600 模式 (Daniel P. Berrang&eacute ) [Orabug: 29861433]{CVE-2019-10132} - admin:拒絕用戶端,除非其 UID 符合當前 UID (Daniel P. Berrang&eacute ) [Orabug: 29861433]{CVE-2019-10132}

解決方案

更新受影響的 libvirt 套件。

另請參閱

https://oss.oracle.com/pipermail/el-errata/2019-July/008892.html

Plugin 詳細資訊

嚴重性: High

ID: 126674

檔案名稱: oraclelinux_ELSA-2019-4714.nasl

版本: 1.4

類型: local

代理程式: unix

已發布: 2019/7/15

已更新: 2020/1/8

相依性: ssh_get_info.nasl

風險資訊

CVSS 評分資料來源: CVE-2019-10161

VPR

風險因素: High

分數: 8.4

CVSS v2

風險因素: High

基本分數: 7.2

時間分數: 5.3

媒介: AV:L/AC:L/Au:N/C:C/I:C/A:C

時間媒介: E:U/RL:OF/RC:C

CVSS v3

風險因素: High

基本分數: 7.8

時間分數: 6.8

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:oracle:linux:libvirt, p-cpe:/a:oracle:linux:libvirt-admin, p-cpe:/a:oracle:linux:libvirt-bash-completion, p-cpe:/a:oracle:linux:libvirt-client, p-cpe:/a:oracle:linux:libvirt-daemon, p-cpe:/a:oracle:linux:libvirt-daemon-config-network, p-cpe:/a:oracle:linux:libvirt-daemon-config-nwfilter, p-cpe:/a:oracle:linux:libvirt-daemon-driver-interface, p-cpe:/a:oracle:linux:libvirt-daemon-driver-lxc, p-cpe:/a:oracle:linux:libvirt-daemon-driver-network, p-cpe:/a:oracle:linux:libvirt-daemon-driver-nodedev, p-cpe:/a:oracle:linux:libvirt-daemon-driver-nwfilter, p-cpe:/a:oracle:linux:libvirt-daemon-driver-qemu, p-cpe:/a:oracle:linux:libvirt-daemon-driver-secret, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-core, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-disk, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-gluster, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-iscsi, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-logical, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-mpath, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-rbd, p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-scsi, p-cpe:/a:oracle:linux:libvirt-daemon-kvm, p-cpe:/a:oracle:linux:libvirt-daemon-lxc, p-cpe:/a:oracle:linux:libvirt-daemon-qemu, p-cpe:/a:oracle:linux:libvirt-devel, p-cpe:/a:oracle:linux:libvirt-docs, p-cpe:/a:oracle:linux:libvirt-libs, p-cpe:/a:oracle:linux:libvirt-lock-sanlock, p-cpe:/a:oracle:linux:libvirt-login-shell, p-cpe:/a:oracle:linux:libvirt-nss, cpe:/o:oracle:linux:7

必要的 KB 項目: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2019/7/11

弱點發布日期: 2019/5/22

參考資訊

CVE: CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-10132, CVE-2019-10161, CVE-2019-10166, CVE-2019-10167, CVE-2019-10168, CVE-2019-11091