Azure Linux 3.0 安全性更新核心 (CVE-2024-47684)

medium Nessus Plugin ID 215774

概要

遠端 Azure Linux 主機缺少一個或多個安全性更新。

說明

遠端 Azure Linux 3.0 主機上安裝的核心版本比測試版舊。因此,此版本會受到 CVE-2024-47684 公告中提及的一個弱點影響。

- 已解決 Linux 核心中的下列弱點:tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: July 26 15:05:02 rx [11061395.780353] BUG:
kernel NULL pointer dereference, address: 0000000000000020Julyl 26 15:05:02 rx [11061395.787572] #PF:
supervisor read access in kernel modJulyul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present paJulyJul 26 15:05:02 rx [11061395.798362] PGD 0 P4July Jul 26 15:05:02 rx [11061395.801164] Oops:
0000 [#1] SMP NJulyI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-UJulytu Jul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/0July023 Jul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xeJulyx160 Jul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 <48> 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 Julyf7 e3 Jul 26 15:05:02 rx [11061395.849665] RSP:
0018:ffffb75d40003e08 EFLAGS:July010246 Jul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX:
20c49ba5e353f7cf RCX: 000000July0000000 Jul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI:
000000000000231c RDI: ffff9Julyad283a60 Jul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08:
0000000000000000 R09: ffffJuly605e20aa8 Jul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11:
ffffb75d4460f740 R12: fffJuly74ad283900 Jul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14:
ffff9874ad283980 R15: ffJuly874ad283d30 Jul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0July000000000000 Jul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: July0000080050033 Jul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3:
0000003e450ba003 CR4:July00000000760ef0 Jul 26 15:05:02 rx [11061395.9138July PKRU: 55555554 Jul 26 15:05:02 rx [11061395.July786] Call Trace: Jul 26 15:05:02 July[11061395.919488] Jul 26 15:05:02 rx [11061395.921765] ? shoJulyegs.cold+0x1a/0x1f Jul 26 15:05:02 rx [11061395.925July] ? __die+0x90/0xd9 Jul 26 15:05:02 rx [11061395.929169] ?July_context+0x196/0x380 Jul 26 15:05:02 rx [11061395.933088] ? ip6_protocolJulyliver_rcu+0x4e0/0x4e0 Jul 26 15:05:02 rx [11061395.938216] ? ip6_subJulyt_rcv_finish+0x3d/0x50 Jul 26 15:05:02 rx [11061395.943000] ? __bad_area_Julyemaphore+0x50/0x1a0 Jul 26 15:05:02 rx [11061395.947873] ? badJulyea_nosemaphore+0x16/0x20 Jul 26 15:05:02 rx [11061395.952486] ? doJulyer_addr_fault+0x267/0x450 Jul 26 15:05:02 rx [11061395.957104July ipv6_list_rcv+0x112/0x140 Jul 26 15:05:02 rx [11061395.96127July? __do_page_fault+0x58/0x90 Jul 26 15:05:02 rx [11061395.965458July do_page_fault+0x2c/0xe0 Jul 26 15:05:02 rx [1106139July69465] ? page_fault+0x34/0x40 Jul 26 15:05:02 rx [11061395.9July17] ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.9773July ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.9814July tcp_send_loss_probe+0x10b/0x220 Jul 26 15:05:02 rx [11061395.985937]Julyp_write_timer_handler+0x1b4/0x240 Jul 26 15:05:02 rx [11061395.July809] tcp_write_timer+0x9e/0xe0 Jul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240 Jul 26 15:05:02 rx [110July95.999866] call_timer_fn+0x32/0x130 Jul 26 15:05:02 rx [11061396.0037July
__run_timers.part.0+0x180/0x280 Jul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10 Jul 26 15:05:02 rx [11061396.012July] ? native_x2apic_icr_write+0x30/0x30 Jul 26 15:05:02 rx [11061396.017718] ? lapic_next_even ---truncated--- (CVE-2024-47684)

請注意,Nessus 並未測試此問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://nvd.nist.gov/vuln/detail/CVE-2024-47684

Plugin 詳細資訊

嚴重性: Medium

ID: 215774

檔案名稱: azure_linux_CVE-2024-47684.nasl

版本: 1.1

類型: local

已發布: 2025/2/10

已更新: 2025/2/10

支援的感應器: Nessus

風險資訊

VPR

風險因素: Medium

分數: 4.4

CVSS v2

風險因素: Medium

基本分數: 4.6

時間性分數: 3.4

媒介: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS 評分資料來源: CVE-2024-47684

CVSS v3

風險因素: Medium

基本分數: 5.5

時間性分數: 4.8

媒介: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:microsoft:azure_linux:kernel-debuginfo, p-cpe:/a:microsoft:azure_linux:kernel-devel, p-cpe:/a:microsoft:azure_linux:kernel-drivers-gpu, p-cpe:/a:microsoft:azure_linux:kernel-dtb, p-cpe:/a:microsoft:azure_linux:python3-perf, p-cpe:/a:microsoft:azure_linux:kernel-docs, x-cpe:/o:microsoft:azure_linux, p-cpe:/a:microsoft:azure_linux:kernel, p-cpe:/a:microsoft:azure_linux:kernel-drivers-sound, p-cpe:/a:microsoft:azure_linux:bpftool, p-cpe:/a:microsoft:azure_linux:kernel-drivers-accessibility, p-cpe:/a:microsoft:azure_linux:kernel-tools

必要的 KB 項目: Host/local_checks_enabled, Host/cpu, Host/AzureLinux/release, Host/AzureLinux/rpm-list

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2024/12/10

弱點發布日期: 2024/10/21

參考資訊

CVE: CVE-2024-47684