Oracle Linux 9:内核 (ELSA-2024-6997)

high Nessus 插件 ID 207776

简介

远程 Oracle Linux 主机缺少一个或多个安全更新。

描述

远程 Oracle Linux 9 主机上安装的程序包受到 ELSA-2024-6997 公告中提及的多个漏洞影响。

- ARM:9359/1:flush:检查是否为 no-mapping 地址保留了 folio (CKI Backport Bot) [RHEL-42783] {CVE-2024-26947}
-tty:n_gsm:修复 gsm0_receive() 中可能出现的越界 (Steve Best) [RHEL-40517 RHEL-39354] {CVE-2024-36016}
- uio:修复 uio_open 中的释放后使用漏洞 (Ricardo Robaina) [RHEL-41275 RHEL-26233] {CVE-2023-52439}
- gpiolib:cdev:修复 lineinfo_changed_notify 中的释放后使用 (Steve Best) [RHEL-43192 RHEL-39849] {CVE-2024-36899}
- wifi:mac80211:避免通过越界数组索引进行地址计算 (CKI Backport Bot) [RHEL-51287 RHEL-51285] {CVE-2024-41071}
- Input:cyapa - 将缺少的输入核心锁定添加到暂停/恢复功能 (cki-backport-bot) [RHEL-44455] {CVE-2023-52884}
- bpf、sockmap:防止 map delete elem 中的锁反转死锁 (Felix Maurer) [RHEL-41479 RHEL-30107] {CVE-2024-35895}
- scsi:qla2xxx:修复 fcport 的双重释放 (Nilesh Javali) [RHEL-39547 RHEL-40034 RHEL-25184 RHEL-35020] {CVE-2024-26929}
- scsi:qla2xxx:修复 ha->vp_map 指针的双重释放 (Nilesh Javali) [RHEL-39547 RHEL-41325 RHEL-25184 RHEL-35016] {CVE-2024-26930}
- scsi:qla2xxx:修复电缆拔出时的命令刷新 (Nilesh Javali) [RHEL-39547 RHEL-40029 RHEL-25184 RHEL-35012] {CVE-2024-26931}
- net,sunrpc:在 xs_tcp_setup_socket 中发生连接失败时重新映射 EPERM (Benjamin Coddington) [RHEL-53708 RHEL-53004] {CVE-2024-42246}
- wifi:mt76:将 skb_put 替换为 skb_put_zero (CKI Backport Bot) [RHEL-52368] {CVE-2024-42225}
- cppc_cpufreq: 修复可能的空指针取消引用 (cki-backport-bot) [RHEL-44145] {CVE-2024-38573}
- ring-buffer:修复阅读器之间的争用和调整大小检查 (cki-backport-bot) [RHEL-43920] {CVE-2024-38601}
- fork:延迟链接文件 vma,直到 vma 完全初始化 (Rafael Aquini) [RHEL-35617 RHEL-35022] {CVE-2024-27022}
- ACPICA:恢复“ACPICA:避免信息:映射多个 BAR。Your kernel is fine.” (CKI Backport Bot) [RHEL-48393 RHEL-48391] {CVE-2024-40984}
- KVM: x86/mmu:x86:检查属性时不要溢出 lpage_info (Maxim Levitsky) [RHEL-41345 RHEL-32430] {CVE-2024-26991}
- net/sched:act_mirred:如果已经丢失 skb,请不要替代 retval (Davide Caratti) [RHEL-42644 RHEL-31724] {CVE-2024-26739}
- cpufreq:exit() 回调为可选 (cki-backport-bot) [RHEL-43848] {CVE-2024-38615}
- gfs2:修复卸载时潜在的 glock 释放后使用 (Andreas Gruenbacher) [RHEL-44157 RHEL-44155] {CVE-2024-38570}
- gfs2:通过 out_free 标签简化 gdlm_put_lock (Andreas Gruenbacher) [RHEL-44157 RHEL-44155] {CVE-2024-38570}
- gfs2:删除位置不当的一致性检查 (Andreas Gruenbacher) [RHEL-44157 RHEL-44155] {CVE-2024-38570}

Tenable 已直接从 Oracle Linux 安全公告中提取上述描述块。

请注意,Nessus 尚未测试这些问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://linux.oracle.com/errata/ELSA-2024-6997.html

插件详情

严重性: High

ID: 207776

文件名: oraclelinux_ELSA-2024-6997.nasl

版本: 1.3

类型: local

代理: unix

发布时间: 2024/9/26

最近更新时间: 2025/2/6

支持的传感器: Frictionless Assessment Agent, Nessus Agent, Continuous Assessment, Nessus

风险信息

VPR

风险因素: Medium

分数: 6.7

CVSS v2

风险因素: Medium

基本分数: 6.8

时间分数: 5

矢量: CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:C

CVSS 分数来源: CVE-2024-42225

CVSS v3

风险因素: High

基本分数: 7.8

时间分数: 6.8

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

CVSS 分数来源: CVE-2024-38570

漏洞信息

CPE: cpe:/a:oracle:linux:9::appstream, cpe:/o:oracle:linux:9, p-cpe:/a:oracle:linux:kernel-headers, p-cpe:/a:oracle:linux:kernel-debug-uki-virt, p-cpe:/a:oracle:linux:kernel-debug-modules-core, p-cpe:/a:oracle:linux:kernel-modules, p-cpe:/a:oracle:linux:kernel-debug-devel-matched, p-cpe:/a:oracle:linux:kernel-abi-stablelists, cpe:/a:oracle:linux:9::codeready_builder, p-cpe:/a:oracle:linux:kernel-devel-matched, p-cpe:/a:oracle:linux:kernel-debug, p-cpe:/a:oracle:linux:kernel-core, p-cpe:/a:oracle:linux:kernel-modules-core, p-cpe:/a:oracle:linux:kernel-uki-virt, p-cpe:/a:oracle:linux:kernel-tools-libs-devel, p-cpe:/a:oracle:linux:rtla, p-cpe:/a:oracle:linux:kernel-devel, p-cpe:/a:oracle:linux:kernel-cross-headers, p-cpe:/a:oracle:linux:kernel-debug-modules, p-cpe:/a:oracle:linux:kernel-tools, p-cpe:/a:oracle:linux:rv, p-cpe:/a:oracle:linux:kernel-debug-devel, p-cpe:/a:oracle:linux:libperf, p-cpe:/a:oracle:linux:kernel-debug-modules-extra, p-cpe:/a:oracle:linux:python3-perf, p-cpe:/a:oracle:linux:bpftool, p-cpe:/a:oracle:linux:kernel-debug-core, cpe:/o:oracle:linux:9:4:baseos_patch, p-cpe:/a:oracle:linux:perf, p-cpe:/a:oracle:linux:kernel-modules-extra, cpe:/o:oracle:linux:9::baseos_latest, p-cpe:/a:oracle:linux:kernel-tools-libs, p-cpe:/a:oracle:linux:kernel

必需的 KB 项: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

易利用性: No known exploits are available

补丁发布日期: 2024/9/24

漏洞发布日期: 2024/2/15

参考资料信息

CVE: CVE-2023-52439, CVE-2023-52884, CVE-2024-26739, CVE-2024-26929, CVE-2024-26930, CVE-2024-26931, CVE-2024-26947, CVE-2024-26991, CVE-2024-27022, CVE-2024-35895, CVE-2024-36016, CVE-2024-36899, CVE-2024-38562, CVE-2024-38570, CVE-2024-38573, CVE-2024-38601, CVE-2024-38615, CVE-2024-40984, CVE-2024-41071, CVE-2024-42225, CVE-2024-42246