CVE-2017-5715/CVE-2017-5754在CentOS8.2/8.3系统禁用方法

补丁对应的问题背景

问题说明、影响、解决方案
CVE-2017-5715

Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor’s data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.

CVE-2017-5754

Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block.

检测脚本

https://access.redhat.com/labs/speculativeexecution/

打补丁对系统的影响

影响系统性能

Red Hat has made updated kernels available to address these security vulnerabilities. These patches are enabled by default because Red Hat prioritizes out of the box security. Speculative execution is a performance optimization technique which these updates change (both kernel and microcode) and may result in workload-specific performance degradation.

如何禁用

Controlling the Performance Impact of Microcode and Security Patches for CVE-2017-5754 CVE-2017-5715 and CVE-2017-5753 using Red Hat Enterprise Linux Tunables

CentOS8禁用

1.解决方案

Is there kernel parameter to control the optional mitigations for CPU vulnerabilities that is architecture independent?
文章提到,到了CentOS8.2后增加了一个叫mitigations的字段
8.1 release and 8.2 release

2.检查内核版本是否支持
# 以4.18.0-240为例
rpm -q --changelog kernel-4.18.0-240.el8.x86_64 | grep mitigations=
# 结果,说明支持这个选型
- [arm64] arm64/speculation: Support 'mitigations=' cmdline option (Jeremy Linton) [1640855]
- [x86] x86/speculation/mds: Add 'mitigations=' support for MDS (Waiman Long) [1713695 1690360 1690351 1690338] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091}
- [s390] s390/speculation: Support 'mitigations=' cmdline option (Waiman Long) [1713695 1690360 1690351 1690338] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091}
- [powerpc] powerpc/speculation: Support 'mitigations=' cmdline option (Waiman Long) [1713695 1690360 1690351 1690338] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091}
- [mm] x86/speculation: Support 'mitigations=' cmdline option (Waiman Long) [1713695 1690360 1690351 1690338] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091}
- [kernel] cpu/speculation: Add 'mitigations=' cmdline option (Waiman Long) [1713695 1690360 1690351 1690338] {CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091}
3.设置

选项说明

sudo vim /etc/default/grub
# 在GRUB_CMDLINE_LINUX=增加
mitigations=off
# 生产文件
sudo grub2-mkconfig -o /boot/grub2/grub.cfg
# 重启系统生效
sudo systemctl reboot
4.验证是否生效
cat /sys/devices/system/cpu/vulnerabilities/meltdown
cat /sys/devices/system/cpu/vulnerabilities/spectre_v2
默认(未修改前)

在这里插入图片描述

修改后

vulnerable代表没有打补丁,容易受攻击
在这里插入图片描述

5.没有生效的问题

部分IntelCPU因为硬件上已经解决了该问题,因此我们打mitigations=off并没有出现预期的vulnerable,详细情况请参考Inter官网
Affected Processors: Transient Execution Attacks & Related Security Issues by CPU

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
CVE-2017-7504是指JBoss AS 4.x及之前版本中的一个反序列化漏洞,该漏洞存在于JbossMQ实现过程的JMS over HTTP Invocation Layer的HTTPServerILServlet.java文件中。攻击者可以利用特制的序列化数据利用该漏洞执行任意代码。与CVE-2015-7501漏洞原理相似,但利用的路径不同,CVE-2017-7504出现在/jbossmq-httpil/HTTPServerILServlet路径下。\[1\] 要利用CVE-2017-7504漏洞,可以按照以下步骤进行操作: 1. 访问靶场环境。 2. 使用CVE-2017-12149的工具和脚本在攻击机上执行命令,生成poc(详情请参考相关文章)\[2\]。 3. 在另一个终端上监听端口。 4. 在第一个终端上执行命令,生成成功\[3\]。 请注意,这只是一种利用CVE-2017-7504漏洞的方法,具体操作可能因环境和工具而异。 #### 引用[.reference_title] - *1* [JBossMQ JMS 反序列化漏洞(CVE-2017-7504)](https://blog.csdn.net/weixin_51151498/article/details/128283378)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^control_2,239^v3^insert_chatgpt"}} ] [.reference_item] - *2* [[Vulfocus解题系列] jboss 反序列化 (CVE-2017-7504)](https://blog.csdn.net/qq_45813980/article/details/118653639)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^control_2,239^v3^insert_chatgpt"}} ] [.reference_item] - *3* [JBoss反序列漏洞(CVE-2017-7504)](https://blog.csdn.net/weixin_46411728/article/details/126714312)[target="_blank" data-report-click={"spm":"1018.2226.3001.9630","extra":{"utm_source":"vip_chatgpt_common_search_pc_result","utm_medium":"distribute.pc_search_result.none-task-cask-2~all~insert_cask~default-1-null.142^v91^control_2,239^v3^insert_chatgpt"}} ] [.reference_item] [ .reference_list ]

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值