Rocky Linux 9:kernel (RLSA-2024:4928)

high Nessus Plugin ID 204939

概要

遠端 Rocky Linux 主機缺少一個或多個安全性更新。

說明

遠端 Rocky Linux 9 主機上安裝的多個套件受到 RLSA-2024:4928 公告中提及的多個弱點影響。

* 核心:block:長度和邏輯區塊大小不相符時,ioctl.c 中發生 NULL 指標解除參照 (CVE-2023-52458)

* 核心:ext4:避免從 ext4_mb_try_best_found() 中損毀的群組配置區塊 (CVE-2024-26773)

* 核心:bpf:修正 bpf_timer_cancel_and_free 和 bpf_timer_cancel 之間的爭用情況 (CVE-2024-26737)

* 核心:dm:內部暫停時呼叫恢復方法 (CVE-2024-26880)

* 核心:net/ipv6:避免 ip6_route_mpath_notify() 中可能發生 UAF (CVE-2024-26852)

* 核心:檢查 inode 編號是否為無效的零值 CVE-2024-26982

* 核心:nfp:flower:處理 acti_netdevs 配置失敗 (CVE-2024-27046)

* 核心:octeontx2-af:針對中斷使用獨立的處置程式 (CVE-2024-27030)

* 核心:icmp:防止 icmp_build_probe() 中可能存在的 NULL 解除參照弱點 (CVE-2024-35857)

* 核心:mlxbf_gige:NAPI 初始化後呼叫 request_irq() (CVE-2024-35907)

* 核心:mlxbf_gige:關機期間停止介面 (CVE-2024-35885)

* 核心:scsi:libfc:修正 fc_lport_ptp_setup() 中可能發生的 NULL 指標解除參照 (CVE-2023-52809)

* 核心:can:j1939:j1939_netdev_start():修正 j1939_priv 的 rx_kref 的 UAF (CVE-2021-47459)

* 核心:scsi:lpfc:在呼叫 lpfc_worker_wake_up() 之前釋放 hbalock (CVE-2024-36924)

* 核心:scsi:lpfc:在清理資源之後,移動 NPIV 的傳輸取消註冊 (CVE-2024-36952)

* 核心:net:amd-xgbe:修正 skb 資料長度反向溢位 (CVE-2022-48743)

* 核心:epoll:改善檔案存留期 (CVE-2024-38580)

Tenable 已直接從 Rocky Linux 安全公告擷取前置描述區塊。

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://errata.rockylinux.org/RLSA-2024:4928

https://bugzilla.redhat.com/show_bug.cgi?id=2265794

https://bugzilla.redhat.com/show_bug.cgi?id=2273236

https://bugzilla.redhat.com/show_bug.cgi?id=2273274

https://bugzilla.redhat.com/show_bug.cgi?id=2275690

https://bugzilla.redhat.com/show_bug.cgi?id=2275761

https://bugzilla.redhat.com/show_bug.cgi?id=2278337

https://bugzilla.redhat.com/show_bug.cgi?id=2278435

https://bugzilla.redhat.com/show_bug.cgi?id=2278473

https://bugzilla.redhat.com/show_bug.cgi?id=2281247

https://bugzilla.redhat.com/show_bug.cgi?id=2281647

https://bugzilla.redhat.com/show_bug.cgi?id=2281700

https://bugzilla.redhat.com/show_bug.cgi?id=2282669

https://bugzilla.redhat.com/show_bug.cgi?id=2282898

https://bugzilla.redhat.com/show_bug.cgi?id=2284506

https://bugzilla.redhat.com/show_bug.cgi?id=2284598

https://bugzilla.redhat.com/show_bug.cgi?id=2293316

https://bugzilla.redhat.com/show_bug.cgi?id=2293412

Plugin 詳細資訊

嚴重性: High

ID: 204939

檔案名稱: rocky_linux_RLSA-2024-4928.nasl

版本: 1.3

類型: local

已發布: 2024/8/1

已更新: 2025/1/15

支援的感應器: Continuous Assessment, Nessus

風險資訊

VPR

風險因素: Medium

分數: 6.7

CVSS v2

風險因素: Medium

基本分數: 6.8

時間性分數: 5

媒介: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2021-47459

CVSS v3

風險因素: High

基本分數: 7.8

時間性分數: 6.8

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:rocky:linux:kernel-headers, cpe:/o:rocky:linux:9, p-cpe:/a:rocky:linux:kernel-64k-devel-matched, p-cpe:/a:rocky:linux:kernel-rt-debug-debuginfo, p-cpe:/a:rocky:linux:kernel-zfcpdump-modules-extra, p-cpe:/a:rocky:linux:kernel-64k-debug-debuginfo, p-cpe:/a:rocky:linux:kernel-64k-devel, p-cpe:/a:rocky:linux:kernel-debug-uki-virt, p-cpe:/a:rocky:linux:kernel-64k-debug-modules-extra, p-cpe:/a:rocky:linux:kernel-tools-debuginfo, p-cpe:/a:rocky:linux:kernel-64k-modules, p-cpe:/a:rocky:linux:kernel-rt-debug, p-cpe:/a:rocky:linux:kernel-zfcpdump-modules, p-cpe:/a:rocky:linux:kernel-zfcpdump-devel-matched, p-cpe:/a:rocky:linux:kernel-64k, p-cpe:/a:rocky:linux:bpftool-debuginfo, p-cpe:/a:rocky:linux:kernel-zfcpdump-modules-core, p-cpe:/a:rocky:linux:perf, p-cpe:/a:rocky:linux:kernel-64k-debuginfo, p-cpe:/a:rocky:linux:kernel-64k-debug-modules-core, p-cpe:/a:rocky:linux:kernel-rt-debug-devel, p-cpe:/a:rocky:linux:kernel-debuginfo, p-cpe:/a:rocky:linux:kernel-debug-modules-core, p-cpe:/a:rocky:linux:kernel-rt-devel, p-cpe:/a:rocky:linux:kernel-debug-modules, p-cpe:/a:rocky:linux:kernel-debug-core, p-cpe:/a:rocky:linux:kernel-rt-debug-modules, p-cpe:/a:rocky:linux:kernel-zfcpdump-core, p-cpe:/a:rocky:linux:kernel-cross-headers, p-cpe:/a:rocky:linux:python3-perf, p-cpe:/a:rocky:linux:kernel-devel, p-cpe:/a:rocky:linux:kernel-rt-debug-modules-core, p-cpe:/a:rocky:linux:kernel-64k-modules-core, p-cpe:/a:rocky:linux:kernel-debug-devel, p-cpe:/a:rocky:linux:kernel-zfcpdump, p-cpe:/a:rocky:linux:kernel-rt-core, p-cpe:/a:rocky:linux:kernel-rt-debuginfo, p-cpe:/a:rocky:linux:kernel, p-cpe:/a:rocky:linux:kernel-rt-debug-core, p-cpe:/a:rocky:linux:kernel-64k-debug-devel, p-cpe:/a:rocky:linux:kernel-rt-kvm, p-cpe:/a:rocky:linux:kernel-zfcpdump-debuginfo, p-cpe:/a:rocky:linux:kernel-64k-core, p-cpe:/a:rocky:linux:kernel-64k-debug-modules, p-cpe:/a:rocky:linux:kernel-modules-core, p-cpe:/a:rocky:linux:kernel-64k-modules-extra, p-cpe:/a:rocky:linux:kernel-modules-extra, p-cpe:/a:rocky:linux:kernel-debug, p-cpe:/a:rocky:linux:rtla, p-cpe:/a:rocky:linux:python3-perf-debuginfo, p-cpe:/a:rocky:linux:kernel-rt-modules, p-cpe:/a:rocky:linux:kernel-tools-libs-devel, p-cpe:/a:rocky:linux:kernel-64k-debug-devel-matched, p-cpe:/a:rocky:linux:kernel-rt-debug-kvm, p-cpe:/a:rocky:linux:kernel-debug-modules-extra, p-cpe:/a:rocky:linux:kernel-rt, p-cpe:/a:rocky:linux:kernel-64k-debug, p-cpe:/a:rocky:linux:kernel-rt-debug-modules-extra, p-cpe:/a:rocky:linux:kernel-rt-modules-core, p-cpe:/a:rocky:linux:kernel-rt-modules-extra, p-cpe:/a:rocky:linux:bpftool, p-cpe:/a:rocky:linux:libperf-debuginfo, p-cpe:/a:rocky:linux:kernel-debug-devel-matched, p-cpe:/a:rocky:linux:kernel-devel-matched, p-cpe:/a:rocky:linux:kernel-tools-libs, p-cpe:/a:rocky:linux:kernel-uki-virt, p-cpe:/a:rocky:linux:kernel-core, p-cpe:/a:rocky:linux:kernel-abi-stablelists, p-cpe:/a:rocky:linux:kernel-modules, p-cpe:/a:rocky:linux:rv, p-cpe:/a:rocky:linux:kernel-64k-debug-core, p-cpe:/a:rocky:linux:kernel-zfcpdump-devel, p-cpe:/a:rocky:linux:kernel-tools, p-cpe:/a:rocky:linux:libperf, p-cpe:/a:rocky:linux:kernel-debug-debuginfo, p-cpe:/a:rocky:linux:perf-debuginfo

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/RockyLinux/release, Host/RockyLinux/rpm-list

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2024/8/1

弱點發布日期: 2024/2/15

參考資訊

CVE: CVE-2021-47459, CVE-2022-48743, CVE-2023-52458, CVE-2023-52809, CVE-2024-26737, CVE-2024-26773, CVE-2024-26852, CVE-2024-26880, CVE-2024-26982, CVE-2024-27030, CVE-2024-27046, CVE-2024-35857, CVE-2024-35885, CVE-2024-35907, CVE-2024-36924, CVE-2024-36952, CVE-2024-38580