OracleVM 3.4:xen (OVMSA-2017-0116)

high Nessus 插件 ID 101195

简介

远程 OracleVM 主机缺少一个或多个安全更新。

描述

远程 OracleVM 系统缺少解决关键安全更新的必要补丁:

- BUILDINFO:xen commit=74b662e79bc874fe8ad8a93d2891e6569c380004

- BUILDINFO:QEMU 上游 commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- gnttab:__gnttab_unmap_common_complete 为 all-or-nothing (Jan Beulich) [Orabug:26288614]

- gnttab:修正映射请求期间,获取页面引用的逻辑 (George Dunlap) [Orabug:26288614]

- gnttab:除非要求,否则绝不创建主机映射 (Jan Beulich)

- gnttab:修复取消映射期间对 dev_bus_addr 的处理 (George Dunlap)

- x86/shadow:在仿真写入期间持有引用 (Andrew Cooper) [Orabug:26288568]

- x86/mm:禁止从 HVM 域进行页面窃取 (Jan Beulich)

- guest_physmap_remove_page 需要检查其返回值 (Jan Beulich) [Orabug:26288602]

- xen/memory:修复对 guest_remove_page 的返回值处理 (Andrew Cooper) [Orabug:26288602]

- evtchn:避免空取消引用 (Jan Beulich) [Orabug:
26288583]

- gnttab:更正 maptrack 表访问 (Jan Beulich) [Orabug:26288557]

- gnttab:避免潜在的 maptrack 条目双重放置 (George Dunlap)

- gnttab:修复取消映射引脚核算争用(Jan Beulich)[Orabug:26288557]

- IOMMU:处理 IOMMU 映射和取消映射失败 (Quan Xu) [Orabug:26288557]

- xen/disk:请勿通过响应环泄露堆栈数据 (Jan Beulich)

- BUILDINFO:xen commit=7b45c3eb48a884f56f072a97a9a8da4d0b1077ed

- BUILDINFO:QEMU 上游 commit=44c5f0a55d9a73e592426c33ce5705c969681955

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- livepatch:在调试控制台上错误地使用了自旋锁。
(Konrad Rzeszutek Wilk) [Orabug:26248311]

- BUILDINFO:xen commit=40e21e7aea2b8bbc991346c3f516dfac4f94affe

- BUILDINFO:QEMU 上游 commit=44c5f0a55d9a73e592426c33ce5705c969681955

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86/do_invalid_op 应使用 is_active_kernel_text,而不是其 (Konrad Rzeszutek Wilk) [Orabug:
26129273]

- BUILDINFO:xen commit=0eadc919cf32139e5565e0d869ed09f35c0a3212

- BUILDINFO:QEMU 上游 commit=44c5f0a55d9a73e592426c33ce5705c969681955

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- kexec:为整个超级调用添加自旋锁。(Konrad Rzeszutek Wilk)

- kexec:卸载 kexec 图像时,清理 kexec_image插槽 (Bhavesh Davda) [Orabug:25861742]

- BUILDINFO:xen commit=8b90d66cd941599d50ee80e14fd144e337814bf6

- BUILDINFO:QEMU 上游 commit=44c5f0a55d9a73e592426c33ce5705c969681955

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- x86:更正 create_bounce_frame(以 CVE 编号标记)(Boris Ostrovsky) [Orabug:25927739] (CVE-2017-8905)

- x86:窃取页面时丢弃类型信息(以 CVE 编号标记)(Boris Ostrovsky) [Orabug:
25927669] (CVE-2017-8904)

- multicall:处理提前退出条件(以 CVE 编号标记)(Boris Ostrovsky) [Orabug:25927592] (CVE-2017-8903)

- BUILDINFO:xen commit=583dedab5ceddbae4d0384de0ade8feeee75f78c

- BUILDINFO:QEMU 上游 commit=fcd17fdf18b95a9e408acc84f6d2b37cf3fc0335

- BUILDINFO:传统 QEMU commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba

- BUILDINFO:IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e

- BUILDINFO:SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee

- tools/libxc:将 xc_lockprof_query_number 中的 max_elem 设为零 (Boris Ostrovsky) [Orabug:
26020611]

解决方案

更新受影响的 xen/xen-tools 程序包。

另见

https://oss.oracle.com/pipermail/oraclevm-errata/2017-June/000744.html

插件详情

严重性: High

ID: 101195

文件名: oraclevm_OVMSA-2017-0116.nasl

版本: 3.7

类型: local

发布时间: 2017/7/3

最近更新时间: 2021/1/4

支持的传感器: Nessus

风险信息

VPR

风险因素: Medium

分数: 6.5

CVSS v2

风险因素: High

基本分数: 7.2

时间分数: 5.3

矢量: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

风险因素: High

基本分数: 8.8

时间分数: 7.7

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:oracle:vm:xen, p-cpe:/a:oracle:vm:xen-tools, cpe:/o:oracle:vm_server:3.4

必需的 KB 项: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

易利用性: No known exploits are available

补丁发布日期: 2017/6/30

漏洞发布日期: 2017/5/11

参考资料信息

CVE: CVE-2017-8903, CVE-2017-8904, CVE-2017-8905