OracleVM 3.4:xen (OVMSA-2018-0020) (Meltdown) (Spectre)

high Nessus 插件 ID 107129

简介

远程 OracleVM 主机缺少一个或多个安全更新。

描述

远程 OracleVM 系统缺少解决关键安全更新的必要补丁:

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=9ccc143584e12027a8db854d19ce8a120d22cfac

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- gnttab:版本变更后,请勿盲目释放状态页 (Andrew Cooper) [Orabug:27614581] (CVE-2018-7541)

- 内存:请勿暗中取消对 decrease-reservation 的固定 (Andrew Cooper) [Orabug:27614605] (CVE-2018-7540)

- xend:如果 bios 中的 smt 关闭,允许设置拓扑 (Elena Ufimtseva)

- x86/svm:功能不受支持时,清除 CPUID IBPB (Elena Ufimtseva) [Orabug:27416699]

- x86/domain:在 cpuid_policy_changed 之前移动 hvm_vcpu_initialize (Elena Ufimtseva) [Orabug:
27416699]

- x86、amd_ucode:支持将多个容器文件附加在一起 (Aravind Gopalakrishnan) [Orabug:27416699]

- x86 / intel:将默认调控器更改为性能 (Joao Martins)

- x86/cpuidle:勘误表 AAJ72 导致深层 C 状态禁用 (Joao Martins) [Orabug:27614625]

- 恢复“将最大 cstate 设置为1”(Joao Martins) [Orabug:27614625]

- x86/cpuidle:添加新的 CPU 系列 (Jan Beulich) [Orabug:27614625]

- x86/Intel:Broadwell 没有 PKG_C[8,9,10]_RESIDENCY MSR (Jan Beulich) [Orabug:27614625]

- x86:支持更新的 Intel CPU 型号 (Jan Beulich) [Orabug:27614625]

- mwait-idle:添加 KBL 支持 (Len Brown) [Orabug:
27614625]

- mwait-idle:添加 SKX 支持 (Len Brown) [Orabug:
27614625]

- mwait_idle:Skylake 客户端支持 (Len Brown) [Orabug:27614625]

- x86:支持更新的 Intel CPU 型号 (Jan Beulich) [Orabug:27614625]

- x86/idle:更新以纳入其他程序包/核心驻留 MSR (Jan Beulich) [Orabug:27614625]

- mwait-idle:支持其他 Broadwell 模型 (Len Brown) [Orabug:27614625]

- x86/mwait-idle:Broadwell 支持 (Len Brown) [Orabug:27614625]

- x86/mwait-idle:禁用 Baytrail 核心和 C6 auto-demotion 模块 (Len Brown) [Orabug:27614625]

- mwait-idle:添加 CPU 型号 54(Atom N2000 系列)(Jan Kiszka) [Orabug:27614625]

- mwait-idle:支持 Bay Trail (Len Brown) [Orabug:
27614625]

- mwait-idle:允许 Bay Trail 中稀疏的子状态数量 (Len Brown) [Orabug:27614625]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=c837c35e1c04791a50f930926ba815ca5b4d3661

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend:客户机重新启动时还原 smt 参数 (Elena Ufimtseva) [Orabug:27574191]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=f36f7903ae0886ab4ef7e3e01c83c9dba819537b

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86/spec_ctrl:修复 SPEC_CTRL_ENTRY_FROM_INTR_IST 中的数个错误 (Andrew Cooper) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86:允许更轻松地禁用 BTI 缓解措施 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86/boot:对 NMI-safe 进行替代修补 (Andrew Cooper) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- xen/cmdline:修复未经装饰的值的 parse_boolean (Andrew Cooper)[Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 稍微优化上下文切换代码 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 将 init_speculation_mitigations 更新至上游版本 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- x86/entry:避免在 NMI/#MC 路径中使用替代项 (Andrew Cooper) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- 将 RSB 相关实现更新至上游版本 (Zhenzhong Duan) [Orabug:27553369] (CVE-2017-5753) (CVE-2017-5715) (CVE-2017-5754)

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=bdecffda647e17f8aaeb4057bd1064236075bc9c

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xend:如果启用安全启动,请勿写入 pci 配置空间 (Elena Ufimtseva) [Orabug:27533309]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=46aa4f995b266e9dc0bce98b448423c5fdc79fde

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- hvmloader:修正 init_vnuma_info 失败时的 nr_vnodes (Annie Li)

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=1fb819ca1b801af1f59983f34776501336a57979

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- 如果目标不允许运行 pv 客户机,迁移将失败 (Annie Li) [Orabug:27465310]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=dfc241a5b6a952bde385b1d68ef42acf8f80302c

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86:泄露 CPUID.7、EDX.26->27 和 CPUID.0x80000008、EBX.12 (redux) (Konrad Rzeszutek Wilk) [Orabug:
27445667]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=d5afa57c42732dc35a572582099c67ee3c397434

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- 默认情况下,启用在 OVM3.4.4 上创建 pv 客户机 (Annie Li) [Orabug:27424482]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=619dd3aa6aac97dbc9f23fdae3d6fd6dfab8a0da

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xen/x86:确保在启用陷阱的情况下调用 identify_cpu (Joao Martins) [Orabug:27393237]

- xend:禁止 pv 客户机运行 (Joao Martins) [Orabug:27370330]

- hvmloader、x86/hvm、domctl:枚举基于 vcpu_to_vnode 的 apicid (Joao Martins) [Orabug:27119689]

- xend:有条件地针对 vnuma auto 使用 dom0 vcpus (Joao Martins)

- x86/Spectre:如果编译器支持不可用,则将 thunk 设置为 THUNK_NONE (Boris Ostrovsky) [Orabug:
27375704]

- BUILDINFO:OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8

- BUILDINFO:xen commit=1d2270f50ef2b1b22b8f6ee7a9b571ea96f7f37b

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- xen:dracut 和 microcode_ctl RPMs 无依存关系 (Boris Ostrovsky) [Orabug:27409734]

解决方案

更新受影响的 xen/xen-tools 程序包。

另见

http://www.nessus.org/u?884f76d4

插件详情

严重性: High

ID: 107129

文件名: oraclevm_OVMSA-2018-0020.nasl

版本: 3.9

类型: local

发布时间: 2018/3/5

最近更新时间: 2019/9/27

支持的传感器: Nessus

风险信息

VPR

风险因素: High

分数: 8.4

CVSS v2

风险因素: Medium

基本分数: 6.1

时间分数: 5.3

矢量: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:C

CVSS v3

风险因素: High

基本分数: 8.8

时间分数: 8.4

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:H/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4

必需的 KB 项: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

可利用: true

易利用性: Exploits are available

补丁发布日期: 2018/3/2

漏洞发布日期: 2018/1/4

可利用的方式

CANVAS (CANVAS)

参考资料信息

CVE: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-7540, CVE-2018-7541

IAVA: 2018-A-0019, 2018-A-0020