Rocky Linux 9内核 (RLSA-2024:4583)

critical Nessus 插件 ID 204769

简介

远程 Rocky Linux 主机缺少一个或多个安全更新。

描述

远程 Rocky Linux 9 主机上存在安装的程序包该程序包受到公告 RLSA-2024:4583 中提及的多个漏洞的影响。

* 内核:TIPC 消息重组释放后使用远程代码执行漏洞 (CVE-2024-36886)

* 内核:ethernet:hisilicon:hns: hns_dsaf_misc:修复 hns_dsaf_ge_srst_by_port() 中可能的数组溢出 (CVE-2021-47548)

* 内核:net:hns3:修复 hclgevf_send_mbx_msg 中的释放后使用缺陷(CVE-2021-47596)

* 内核:vt:修复删除缓冲区中的字符时会发生内存重叠的问题 (CVE-2022-48627)

* 内核:can:j1939:通过将 j1939_socks_lock 更改为 rwlock 来防止死锁 (CVE-2023-52638)

* 内核:mm/vmscan:修复以错误区域索引调用 wakeup_kswapd() 的错误 (CVE-2024-26783)

* 内核:net/mlx5e:填充 metadata_map 之后,使用内存屏障执行 PTP WQ xmit 提交跟踪 (CVE-2024-26858)

* 内核:netfilter:nf_tables:使用时间戳检查 set 元素超时 (CVE-2024-27397)

* 内核:nvme:修复因保留标签分配而导致的重新连接失败 (CVE-2024-27435)

* 内核:net:ena:修复错误的描述符释放行为 (CVE-2024-35958)

* 内核:tcp:在 tcp_twsk_unique() 中使用 refcount_inc_not_zero()。(CVE-2024-36904)

* 内核:lib/test_hmm.c:处理 src_pfns 和 dst_pfns 分配失败 (CVE-2024-38543)

* 内核:r8169:修复拆分后的 Tx 数据包上可能存在的环形缓冲区损坏。(CVE-2024-38586)

* 内核:net:micrel:修复在 lan8841 的框架中接收时间戳 (CVE-2024-38593)

* 内核:netfilter:tproxy:如果已在设备上禁用 IP,则离开 (CVE-2024-36270)

* 内核:octeontx2-af:避免用户空间的差一读取 (CVE-2024-36957)

* 内核:blk-cgroup:修复因重置 io stat 而导致的列表损坏 (CVE-2024-38663)

Tenable 已直接从 Rocky Linux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://errata.rockylinux.org/RLSA-2024:4583

https://bugzilla.redhat.com/show_bug.cgi?id=2267509

https://bugzilla.redhat.com/show_bug.cgi?id=2273082

https://bugzilla.redhat.com/show_bug.cgi?id=2273466

https://bugzilla.redhat.com/show_bug.cgi?id=2275735

https://bugzilla.redhat.com/show_bug.cgi?id=2277238

https://bugzilla.redhat.com/show_bug.cgi?id=2280434

https://bugzilla.redhat.com/show_bug.cgi?id=2281131

https://bugzilla.redhat.com/show_bug.cgi?id=2281925

https://bugzilla.redhat.com/show_bug.cgi?id=2283401

https://bugzilla.redhat.com/show_bug.cgi?id=2284541

https://bugzilla.redhat.com/show_bug.cgi?id=2284581

https://bugzilla.redhat.com/show_bug.cgi?id=2293230

https://bugzilla.redhat.com/show_bug.cgi?id=2293380

https://bugzilla.redhat.com/show_bug.cgi?id=2293402

https://bugzilla.redhat.com/show_bug.cgi?id=2293456

https://bugzilla.redhat.com/show_bug.cgi?id=2293653

https://bugzilla.redhat.com/show_bug.cgi?id=2294225

插件详情

严重性: Critical

ID: 204769

文件名: rocky_linux_RLSA-2024-4583.nasl

版本: 1.1

类型: local

发布时间: 2024/7/26

最近更新时间: 2024/7/26

支持的传感器: Continuous Assessment, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: High

基本分数: 7.3

时间分数: 5.4

矢量: CVSS2#AV:N/AC:L/Au:M/C:P/I:P/A:C

CVSS 分数来源: CVE-2021-47548

CVSS v3

风险因素: Critical

基本分数: 9.8

时间分数: 8.5

矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:rocky:linux:kernel-64k-modules-extra, p-cpe:/a:rocky:linux:kernel-rt-debug-debuginfo, p-cpe:/a:rocky:linux:bpftool-debuginfo, p-cpe:/a:rocky:linux:kernel-rt-devel, p-cpe:/a:rocky:linux:kernel-rt-debug-core, p-cpe:/a:rocky:linux:kernel-64k-debug-modules, p-cpe:/a:rocky:linux:kernel-modules-extra, p-cpe:/a:rocky:linux:kernel-rt-modules, p-cpe:/a:rocky:linux:kernel-rt-debug-modules-extra, p-cpe:/a:rocky:linux:bpftool, p-cpe:/a:rocky:linux:kernel-64k-devel-matched, p-cpe:/a:rocky:linux:kernel-zfcpdump-devel-matched, p-cpe:/a:rocky:linux:kernel-64k, p-cpe:/a:rocky:linux:kernel-rt-kvm, p-cpe:/a:rocky:linux:kernel-rt, p-cpe:/a:rocky:linux:kernel-rt-modules-extra, p-cpe:/a:rocky:linux:kernel-devel-matched, p-cpe:/a:rocky:linux:kernel-tools-libs, p-cpe:/a:rocky:linux:kernel-core, p-cpe:/a:rocky:linux:kernel-zfcpdump-devel, p-cpe:/a:rocky:linux:kernel-tools, p-cpe:/a:rocky:linux:kernel-debug-debuginfo, p-cpe:/a:rocky:linux:python3-perf, p-cpe:/a:rocky:linux:kernel-64k-debug, p-cpe:/a:rocky:linux:rv, p-cpe:/a:rocky:linux:kernel-devel, p-cpe:/a:rocky:linux:kernel-64k-debug-modules-extra, p-cpe:/a:rocky:linux:kernel, p-cpe:/a:rocky:linux:kernel-tools-libs-devel, p-cpe:/a:rocky:linux:kernel-64k-debug-core, p-cpe:/a:rocky:linux:perf-debuginfo, p-cpe:/a:rocky:linux:kernel-debug-core, p-cpe:/a:rocky:linux:kernel-zfcpdump-core, p-cpe:/a:rocky:linux:kernel-rt-debug-modules-core, p-cpe:/a:rocky:linux:kernel-rt-core, p-cpe:/a:rocky:linux:kernel-64k-debug-devel, p-cpe:/a:rocky:linux:kernel-64k-debug-devel-matched, p-cpe:/a:rocky:linux:kernel-64k-devel, p-cpe:/a:rocky:linux:kernel-64k-debuginfo, p-cpe:/a:rocky:linux:kernel-rt-debug-devel, p-cpe:/a:rocky:linux:python3-perf-debuginfo, p-cpe:/a:rocky:linux:kernel-64k-debug-debuginfo, p-cpe:/a:rocky:linux:kernel-rt-debug-modules, p-cpe:/a:rocky:linux:kernel-zfcpdump-debuginfo, p-cpe:/a:rocky:linux:libperf-debuginfo, cpe:/o:rocky:linux:9, p-cpe:/a:rocky:linux:perf, p-cpe:/a:rocky:linux:kernel-64k-debug-modules-core, p-cpe:/a:rocky:linux:kernel-debug-devel, p-cpe:/a:rocky:linux:kernel-zfcpdump, p-cpe:/a:rocky:linux:kernel-rt-debuginfo, p-cpe:/a:rocky:linux:kernel-debug-modules-extra, p-cpe:/a:rocky:linux:kernel-64k-modules, p-cpe:/a:rocky:linux:kernel-modules-core, p-cpe:/a:rocky:linux:kernel-headers, p-cpe:/a:rocky:linux:kernel-zfcpdump-modules-extra, p-cpe:/a:rocky:linux:kernel-rt-debug, p-cpe:/a:rocky:linux:kernel-zfcpdump-modules, p-cpe:/a:rocky:linux:kernel-debug-modules-core, p-cpe:/a:rocky:linux:kernel-debug-modules, p-cpe:/a:rocky:linux:kernel-debug, p-cpe:/a:rocky:linux:kernel-debuginfo, p-cpe:/a:rocky:linux:kernel-cross-headers, p-cpe:/a:rocky:linux:kernel-64k-modules-core, p-cpe:/a:rocky:linux:kernel-abi-stablelists, p-cpe:/a:rocky:linux:kernel-modules, p-cpe:/a:rocky:linux:kernel-zfcpdump-modules-core, p-cpe:/a:rocky:linux:kernel-64k-core, p-cpe:/a:rocky:linux:rtla, p-cpe:/a:rocky:linux:kernel-rt-modules-core, p-cpe:/a:rocky:linux:kernel-debug-devel-matched, p-cpe:/a:rocky:linux:libperf, p-cpe:/a:rocky:linux:kernel-tools-debuginfo, p-cpe:/a:rocky:linux:kernel-rt-debug-kvm, p-cpe:/a:rocky:linux:kernel-uki-virt, p-cpe:/a:rocky:linux:kernel-debug-uki-virt

必需的 KB 项: Host/local_checks_enabled, Host/RockyLinux/release, Host/RockyLinux/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2024/7/26

漏洞发布日期: 2024/3/2

参考资料信息

CVE: CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663