Linux Distros 未修补的漏洞: CVE-2017-5967

medium Nessus 插件 ID 221430

简介

Linux/Unix 主机上安装的一个或多个程序包存在漏洞,但供应商表示不会修补此漏洞。

描述

Linux/Unix 主机中安装的一个或多个程序包受到一个漏洞影响,而供应商没有提供补丁程序。

- Linux 内核 4.9.9 及之前的版本中的时间子系统在启用 CONFIG_TIMER_STATS 时,可让本地用户通过读取 /proc/timer_list 文件,发现真正的 PID 值(与 PID 命名空间内的 PID 值不同),这与 kernel/time/timer_list.c 中的 print_timer 函数,
以及 kernel/time/timer.c 中的 __timer_stats_timer_set_start_info 函数有关。(CVE-2017-5967)

请注意,Nessus 依赖供应商报告的程序包是否存在进行判断。

解决方案

目前尚未有任何已知的解决方案。

另见

https://access.redhat.com/security/cve/cve-2017-5967

https://ubuntu.com/security/CVE-2017-5967

插件详情

严重性: Medium

ID: 221430

文件名: unpatched_CVE_2017_5967.nasl

版本: 1.6

类型: local

代理: unix

系列: Misc.

发布时间: 2025/3/4

最近更新时间: 2025/9/6

支持的传感器: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

风险信息

VPR

风险因素: Low

分数: 1.4

CVSS v2

风险因素: Low

基本分数: 2.1

时间分数: 1.6

矢量: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS 分数来源: CVE-2017-5967

CVSS v3

风险因素: Medium

基本分数: 4

时间分数: 3.5

矢量: CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: cpe:/o:canonical:ubuntu_linux:20.04:-:lts, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-doc, p-cpe:/a:centos:centos:kernel-doc, p-cpe:/a:centos:centos:kernel-debug-devel, p-cpe:/a:centos:centos:kernel-rt-trace-kvm, p-cpe:/a:centos:centos:kernel-kdump-devel, p-cpe:/a:centos:centos:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt, p-cpe:/a:canonical:ubuntu_linux:linux-azure-fde-5.15, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc, p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:perf, p-cpe:/a:centos:centos:kernel-tools-libs, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel, p-cpe:/a:centos:centos:kernel-headers, p-cpe:/a:redhat:enterprise_linux:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm, p-cpe:/a:redhat:enterprise_linux:kernel-tools, p-cpe:/a:centos:centos:kernel-tools-libs-devel, p-cpe:/a:centos:centos:kernel-abi-whitelists, p-cpe:/a:centos:centos:kernel-rt-debug-kvm, p-cpe:/a:centos:centos:perf, p-cpe:/a:centos:centos:bpftool, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace, p-cpe:/a:centos:centos:kernel-rt-doc, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:centos:centos:kernel-kdump, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:centos:centos:kernel-rt-debug, p-cpe:/a:centos:centos:python-perf, p-cpe:/a:centos:centos:kernel-rt-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm, p-cpe:/a:centos:centos:kernel-rt-devel, p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:centos:centos:kernel-rt-kvm, p-cpe:/a:centos:centos:kernel-bootwrapper, p-cpe:/a:canonical:ubuntu_linux:linux-azure-fde, cpe:/o:centos:centos:7, p-cpe:/a:canonical:ubuntu_linux:linux-raspi-realtime, p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug, cpe:/o:redhat:enterprise_linux:7, p-cpe:/a:centos:centos:kernel-debug, p-cpe:/a:centos:centos:kernel-rt, p-cpe:/a:centos:centos:kernel-tools, p-cpe:/a:canonical:ubuntu_linux:linux-intel-iot-realtime, p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel, p-cpe:/a:centos:centos:kernel, p-cpe:/a:centos:centos:kernel-rt-trace-devel, p-cpe:/a:canonical:ubuntu_linux:linux-realtime, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, p-cpe:/a:redhat:enterprise_linux:kernel-bootwrapper, p-cpe:/a:redhat:enterprise_linux:kernel-kdump, p-cpe:/a:canonical:ubuntu_linux:linux-riscv, p-cpe:/a:centos:centos:kernel-rt-trace, p-cpe:/a:redhat:enterprise_linux:python-perf, p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists, p-cpe:/a:canonical:ubuntu_linux:linux

必需的 KB 项: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier

易利用性: No known exploits are available

漏洞发布日期: 2017/2/14

参考资料信息

CVE: CVE-2017-5967