Azure Linux 3.0 安全更新内核 (CVE-2024-47684)

medium Nessus 插件 ID 215774

简介

远程 Azure Linux 主机缺少一个或多个安全更新。

描述

远程 Azure Linux 3.0 主机上安装的内核版本低于 测试的版本。因此,该程序受到 CVE-2024-47684 公告中提及的一个漏洞影响。

- 已修复 Linux 内核中的下列漏洞:tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: July 26 15:05:02 rx [11061395.780353] BUG:
kernel NULL pointer dereference, address: 0000000000000020Julyl 26 15:05:02 rx [11061395.787572] #PF:
supervisor read access in kernel modJulyul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not-present paJulyJul 26 15:05:02 rx [11061395.798362] PGD 0 P4July Jul 26 15:05:02 rx [11061395.801164] Oops:
0000 [#1] SMP NJulyI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-UJulytu Jul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os-gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/0July023 Jul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xeJulyx160 Jul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 <48> 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 Julyf7 e3 Jul 26 15:05:02 rx [11061395.849665] RSP:
0018:ffffb75d40003e08 EFLAGS:July010246 Jul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX:
20c49ba5e353f7cf RCX: 000000July0000000 Jul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI:
000000000000231c RDI: ffff9Julyad283a60 Jul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08:
0000000000000000 R09: ffffJuly605e20aa8 Jul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11:
ffffb75d4460f740 R12: fffJuly74ad283900 Jul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14:
ffff9874ad283980 R15: ffJuly874ad283d30 Jul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0July000000000000 Jul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: July0000080050033 Jul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3:
0000003e450ba003 CR4:July00000000760ef0 Jul 26 15:05:02 rx [11061395.9138July PKRU: 55555554 Jul 26 15:05:02 rx [11061395.July786] Call Trace: Jul 26 15:05:02 July[11061395.919488] Jul 26 15:05:02 rx [11061395.921765] ? shoJulyegs.cold+0x1a/0x1f Jul 26 15:05:02 rx [11061395.925July] ? __die+0x90/0xd9 Jul 26 15:05:02 rx [11061395.929169] ?July_context+0x196/0x380 Jul 26 15:05:02 rx [11061395.933088] ? ip6_protocolJulyliver_rcu+0x4e0/0x4e0 Jul 26 15:05:02 rx [11061395.938216] ? ip6_subJulyt_rcv_finish+0x3d/0x50 Jul 26 15:05:02 rx [11061395.943000] ? __bad_area_Julyemaphore+0x50/0x1a0 Jul 26 15:05:02 rx [11061395.947873] ? badJulyea_nosemaphore+0x16/0x20 Jul 26 15:05:02 rx [11061395.952486] ? doJulyer_addr_fault+0x267/0x450 Jul 26 15:05:02 rx [11061395.957104July ipv6_list_rcv+0x112/0x140 Jul 26 15:05:02 rx [11061395.96127July? __do_page_fault+0x58/0x90 Jul 26 15:05:02 rx [11061395.965458July do_page_fault+0x2c/0xe0 Jul 26 15:05:02 rx [1106139July69465] ? page_fault+0x34/0x40 Jul 26 15:05:02 rx [11061395.9July17] ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.9773July ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.9814July tcp_send_loss_probe+0x10b/0x220 Jul 26 15:05:02 rx [11061395.985937]Julyp_write_timer_handler+0x1b4/0x240 Jul 26 15:05:02 rx [11061395.July809] tcp_write_timer+0x9e/0xe0 Jul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240 Jul 26 15:05:02 rx [110July95.999866] call_timer_fn+0x32/0x130 Jul 26 15:05:02 rx [11061396.0037July
__run_timers.part.0+0x180/0x280 Jul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10 Jul 26 15:05:02 rx [11061396.012July] ? native_x2apic_icr_write+0x30/0x30 Jul 26 15:05:02 rx [11061396.017718] ? lapic_next_even ---truncated--- (CVE-2024-47684)

请注意,Nessus 尚未测试此问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://nvd.nist.gov/vuln/detail/CVE-2024-47684

插件详情

严重性: Medium

ID: 215774

文件名: azure_linux_CVE-2024-47684.nasl

版本: 1.1

类型: local

发布时间: 2025/2/10

最近更新时间: 2025/2/10

支持的传感器: Nessus

风险信息

VPR

风险因素: Medium

分数: 4.4

CVSS v2

风险因素: Medium

基本分数: 4.6

时间分数: 3.4

矢量: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS 分数来源: CVE-2024-47684

CVSS v3

风险因素: Medium

基本分数: 5.5

时间分数: 4.8

矢量: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:microsoft:azure_linux:kernel-debuginfo, p-cpe:/a:microsoft:azure_linux:kernel-devel, p-cpe:/a:microsoft:azure_linux:kernel-drivers-gpu, p-cpe:/a:microsoft:azure_linux:kernel-dtb, p-cpe:/a:microsoft:azure_linux:python3-perf, p-cpe:/a:microsoft:azure_linux:kernel-docs, x-cpe:/o:microsoft:azure_linux, p-cpe:/a:microsoft:azure_linux:kernel, p-cpe:/a:microsoft:azure_linux:kernel-drivers-sound, p-cpe:/a:microsoft:azure_linux:bpftool, p-cpe:/a:microsoft:azure_linux:kernel-drivers-accessibility, p-cpe:/a:microsoft:azure_linux:kernel-tools

必需的 KB 项: Host/local_checks_enabled, Host/cpu, Host/AzureLinux/release, Host/AzureLinux/rpm-list

易利用性: No known exploits are available

补丁发布日期: 2024/12/10

漏洞发布日期: 2024/10/21

参考资料信息

CVE: CVE-2024-47684