Oracle Linux 9:内核 (ELSA-2025-19930)

medium Nessus 插件 ID 274744

简介

远程 Oracle Linux 主机缺少一个或多个安全更新。

描述

远程 Oracle Linux 9 主机上安装的程序包受到 ELSA-2025-19930 公告中提及的多个漏洞影响。

- x86/vmscape将旧 Intel CPU 添加到受影响列表 (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape通过 SMT 禁用 STIBP 时发出警告 (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/缺陷向下移动 cpu_bugs_smt_update() (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape启用缓解措施 (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape添加条件 IBPB 缓解措施 (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/vmscape枚举 VMSCAPE 缺陷 (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- Documentation/hw-vuln添加 VMSCAPE 文档 (Waiman Long) [RHEL-114270] {CVE-2025-40300}
- x86/process在 MONITOR 之前移动缓冲区清理 (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- x86/微代码/AMD添加 TSA 微代码 SHA (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- KVMSVM将 TSA CPUID 位公告给客户机 (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- x86/bugs添加瞬态计划程序攻击缓解 (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350}
- x86/缺陷将 MDS 机械重命名为更通用的名称 (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-36357 CVE-2024-36350} (Waiman Long) [RHEL-83896 RHEL-83905]
- x86/microcode/AMD修复 __apply_microcode_amd() 的返回值 (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2025-22047}
- x86/CPU/AMD终止 erratum_1386_microcode 数组 (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-56721}
- x86/缺陷为 VERW 操作数使用代码段选择器 (Waiman Long) [RHEL-83896 RHEL-83905] {CVE-2024-50072}

Tenable 已直接从 Oracle Linux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://linux.oracle.com/errata/ELSA-2025-19930.html

插件详情

严重性: Medium

ID: 274744

文件名: oraclelinux_ELSA-2025-19930.nasl

版本: 1.1

类型: local

代理: unix

发布时间: 2025/11/11

最近更新时间: 2025/11/11

支持的传感器: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 5.2

CVSS v2

风险因素: Medium

基本分数: 4.6

时间分数: 3.4

矢量: CVSS2#AV:L/AC:L/Au:S/C:C/I:N/A:N

CVSS 分数来源: CVE-2025-40300

CVSS v3

风险因素: Medium

基本分数: 5.6

时间分数: 4.9

矢量: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

CVSS 分数来源: CVE-2024-36357

漏洞信息

CPE: p-cpe:/a:oracle:linux:kernel-tools-libs-devel, p-cpe:/a:oracle:linux:kernel-debug-modules-extra, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:python3-perf, p-cpe:/a:oracle:linux:kernel-tools-libs, p-cpe:/a:oracle:linux:kernel-debug-devel-matched, p-cpe:/a:oracle:linux:kernel-uki-virt-addons, p-cpe:/a:oracle:linux:kernel-core, p-cpe:/a:oracle:linux:kernel-devel, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:kernel, p-cpe:/a:oracle:linux:rv, p-cpe:/a:oracle:linux:kernel-debug-modules-core, p-cpe:/a:oracle:linux:kernel-modules-extra, p-cpe:/a:oracle:linux:kernel-cross-headers, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:libperf, p-cpe:/a:oracle:linux:rtla, p-cpe:/a:oracle:linux:kernel-tools, p-cpe:/a:oracle:linux:kernel-modules, p-cpe:/a:oracle:linux:kernel-uki-virt, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel-devel-matched, p-cpe:/a:oracle:linux:kernel-abi-stablelists, p-cpe:/a:oracle:linux:kernel-debug-core, cpe:/o:oracle:linux:9:6:baseos_patch, p-cpe:/a:oracle:linux:kernel-debug-uki-virt, p-cpe:/a:oracle:linux:kernel-modules-core, p-cpe:/a:oracle:linux:perf, p-cpe:/a:oracle:linux:kernel-debug-modules

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

易利用性: No known exploits are available

补丁发布日期: 2025/11/10

漏洞发布日期: 2025/7/8

参考资料信息

CVE: CVE-2024-36350, CVE-2024-36357, CVE-2025-40300