Debian DLA-1232-1:linux 安全更新 (Meltdown)

high Nessus 插件 ID 105622

简介

远程 Debian 主机缺少安全更新。

描述

在 Linux 内核中发现多个可能导致权限升级、拒绝服务或信息泄漏的漏洞。CVE-2017-5754 多名研究人员在 Intel 处理器中发现一个漏洞,攻击者可通过该漏洞控制非特权进程从任意地址读取内存,包括从内核和系统上运行的所有其他进程读取内存。这种特定的攻击已被命名为 Meltdown,在 Intel x86-64 架构的 Linux 内核中通过名为“内核页表隔离”的一组修补程序解决,这组修补程序对内核和用户空间地址映射实行近乎完全的隔离,从而防止攻击。该解决方案可能会对性能产生影响,可在启动时通过将“pti=off”传递给内核命令行来禁用。CVE-2017-17558 Andrey Konovalov 报告 USB 内核在初始化期间未正确处理某些错误情况。具有特别设计的 USB 设备的实际存在用户可利用此问题造成拒绝服务(崩溃或内存破坏),或可能造成权限升级。CVE-2017-17741 Dmitry Vyukov 报告如果启用 kvm_mmio 跟踪点, x86 的 KVM 实现在仿真 MMIO 写入时会从内存过度读取数据。客户虚拟机可利用此问题导致拒绝服务(崩溃)。CVE-2017-17805 已发现 Salsa20 块密码的一些实现未正确处理零长度输入。本地用户可利用此问题造成拒绝服务(崩溃),或可能产生其他安全影响。CVE-2017-17806 已发现 HMAC 实现可与需要密钥的基础哈希算法一起使用,但这不符合预期。本地用户可利用此问题导致拒绝服务(崩溃或内存损坏),或者可能导致权限升级。CVE-2017-17807 Eric Biggers 发现 KEYS 子系统将密钥添加到进程的默认密钥环时缺少对写入权限的检查。本地用户可利用此问题造成拒绝服务或获取敏感信息。对于 Debian 7“Wheezy”,这些问题已在 3.2.96-3 版本中修复。建议您升级 linux 程序包。注意:Tenable Network Security 已直接从 DLA 安全公告中提取上述描述块。Tenable 已尝试在不引入其他问题的情况下,尽可能进行自动整理和排版。

解决方案

升级受影响的程序包。

另见

https://lists.debian.org/debian-lts-announce/2018/01/msg00004.html

https://packages.debian.org/source/wheezy/linux

插件详情

严重性: High

ID: 105622

文件名: debian_DLA-1232.nasl

版本: 3.8

类型: local

代理: unix

发布时间: 2018/1/8

最近更新时间: 2021/1/11

支持的传感器: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

风险信息

VPR

风险因素: High

分数: 8.1

CVSS v2

风险因素: High

基本分数: 7.2

时间分数: 6.3

矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

漏洞信息

CPE: p-cpe:/a:debian:debian_linux:linux-doc-3.2, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-486, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-4kc-malta, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-5kc-malta, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-amd64, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-armel, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-armhf, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-i386, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-ia64, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-mips, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-mipsel, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-powerpc, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-s390, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-686-pae, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-amd64, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-iop32x, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-itanium, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-ixp4xx, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-kirkwood, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-loongson-2f, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-mckinley, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-mv78xx0, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-mx5, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-octeon, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-s390x, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-all-sparc, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-amd64, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-common, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-common-rt, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-iop32x, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-itanium, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-ixp4xx, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-kirkwood, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-loongson-2f, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-mckinley, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-mv78xx0, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-mx5, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-octeon, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-omap, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-orion5x, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-powerpc, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-powerpc-smp, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-powerpc64, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-r4k-ip22, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-r5k-cobalt, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-r5k-ip32, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-rt-amd64, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-s390x, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-omap, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-orion5x, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-powerpc, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-powerpc-smp, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-powerpc64, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-r4k-ip22, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-r5k-cobalt, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-r5k-ip32, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-rt-686-pae, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-rt-686-pae-dbg, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-rt-amd64, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-rt-amd64-dbg, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-s390x, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-s390x-dbg, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-s390x-tape, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-sb1-bcm91250a, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-sb1a-bcm91480b, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-sparc64, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-sparc64-smp, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-versatile, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-vexpress, p-cpe:/a:debian:debian_linux:linux-libc-dev, p-cpe:/a:debian:debian_linux:linux-manual-3.2, p-cpe:/a:debian:debian_linux:linux-source-3.2, p-cpe:/a:debian:debian_linux:linux-support-3.2.0-4, p-cpe:/a:debian:debian_linux:xen-linux-system-3.2.0-4-686-pae, p-cpe:/a:debian:debian_linux:xen-linux-system-3.2.0-4-amd64, cpe:/o:debian:debian_linux:7.0, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-sb1-bcm91250a, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-sb1a-bcm91480b, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-sparc64, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-sparc64-smp, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-versatile, p-cpe:/a:debian:debian_linux:linux-headers-3.2.0-4-vexpress, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-486, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-4kc-malta, p-cpe:/a:debian:debian_linux:linux-image-3.2.0-4-5kc-malta

必需的 KB 项: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可利用: true

易利用性: Exploits are available

补丁发布日期: 2018/1/7

参考资料信息

CVE: CVE-2017-17558, CVE-2017-17741, CVE-2017-17805, CVE-2017-17806, CVE-2017-17807, CVE-2017-5754

IAVA: 2018-A-0019