Azure Linux 3.0 安全性更新hyperv-daemons (CVE-2024-27009)

medium Nessus Plugin ID 295745

概要

遠端 Azure Linux 主機缺少一個或多個安全性更新。

說明

遠端 Azure Linux 3.0 主機上安裝的 hyperv-daemons 版本比測試版舊。因此,此版本會受到 CVE-2024-27009 公告中提及的一個弱點影響。

- 已解決 Linux 核心中的下列弱點:s390/cio: fix race condition during online processing A race condition exists in ccw_device_set_online() that can cause the online process to fail, leaving the affected device in an inconsistent state. As a result, subsequent attempts to set that device online fail with return code ENODEV. The problem occurs when a path verification request arrives after a wait for final device state completed, but before the result state is evaluated. Fix this by ensuring that the CCW-device lock is held between determining final state and checking result state. Note that since: commit 2297791c92d0 (s390/cio: dont unregister subchannel from child-drivers) path verification requests are much more likely to occur during boot, resulting in an increased chance of this race condition occurring. (CVE-2024-27009)

請注意,Nessus 並未測試此問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

更新受影響的套件。

另請參閱

https://nvd.nist.gov/vuln/detail/CVE-2024-27009

Plugin 詳細資訊

嚴重性: Medium

ID: 295745

檔案名稱: azure_linux_CVE-2024-27009.nasl

版本: 1.1

類型: local

已發布: 2026/1/22

已更新: 2026/1/22

支援的感應器: Nessus

風險資訊

VPR

風險因素: Medium

分數: 4.4

CVSS v2

風險因素: Low

基本分數: 3.8

時間性分數: 2.8

媒介: CVSS2#AV:L/AC:H/Au:S/C:N/I:N/A:C

CVSS 評分資料來源: CVE-2024-27009

CVSS v3

風險因素: Medium

基本分數: 4.7

時間性分數: 4.1

媒介: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

時間媒介: CVSS:3.0/E:U/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:microsoft:azure_linux:hypervvssd, p-cpe:/a:microsoft:azure_linux:hyperv-tools, p-cpe:/a:microsoft:azure_linux:hyperv-daemons-debuginfo, p-cpe:/a:microsoft:azure_linux:hyperv-daemons-license, x-cpe:/o:microsoft:azure_linux, p-cpe:/a:microsoft:azure_linux:hypervfcopyd, p-cpe:/a:microsoft:azure_linux:hypervkvpd, p-cpe:/a:microsoft:azure_linux:hyperv-daemons

必要的 KB 項目: Host/local_checks_enabled, Host/AzureLinux/release, Host/AzureLinux/rpm-list, Host/cpu

可輕鬆利用: No known exploits are available

修補程式發佈日期: 2024/9/10

弱點發布日期: 2024/4/27

參考資訊

CVE: CVE-2024-27009