Azure Linux 3.0 安全更新hyperv-daemons (CVE-2024-27005)

medium Nessus 插件 ID 295674

简介

远程 Azure Linux 主机缺少一个或多个安全更新。

描述

远程 Azure Linux 3.0 主机上安装的 hyperv-daemons 版本低于 测试的 版本。因此,该程序受到 CVE-2024-27005 公告中提及的一个漏洞影响。

- 已修复 Linux 内核中的下列漏洞:interconnect: Don't access req_list while it's being manipulated The icc_lock mutex was split into separate icc_lock and icc_bw_lock mutexes in [1] to avoid lockdep splats. However, this didn't adequately protect access to icc_node::req_list. The icc_set_bw() function will eventually iterate over req_list while only holding icc_bw_lock, but req_list can be modified while only holding icc_lock. This causes races between icc_set_bw(), of_icc_get(), and icc_put(). Example A: CPU0 CPU1 ---- ---- icc_set_bw(path_a) mutex_lock(&icc_bw_lock); icc_put(path_b) mutex_lock(&icc_lock); aggregate_requests() hlist_for_each_entry(r, ... hlist_del(... <r = invalid pointer> Example B: CPU0 CPU1 ---- ---- icc_set_bw(path_a) mutex_lock(&icc_bw_lock); path_b = of_icc_get() of_icc_get_by_index() mutex_lock(&icc_lock); path_find() path_init() aggregate_requests() hlist_for_each_entry(r, ... hlist_add_head(... <r = invalid pointer> Fix this by ensuring icc_bw_lock is always held before manipulating icc_node::req_list. The additional places icc_bw_lock is held don't perform any memory allocations, so we should still be safe from the original lockdep splats that motivated the separate locks. [1] commit af42269c3523 (interconnect: Fix locking for runpm vs reclaim) (CVE-2024-27005)

请注意,Nessus 尚未测试此问题,而是只依据应用程序自我报告的版本号进行判断。

解决方案

更新受影响的程序包。

另见

https://nvd.nist.gov/vuln/detail/CVE-2024-27005

插件详情

严重性: Medium

ID: 295674

文件名: azure_linux_CVE-2024-27005.nasl

版本: 1.1

类型: local

发布时间: 2026/1/22

最近更新时间: 2026/1/22

支持的传感器: Nessus

风险信息

VPR

风险因素: Medium

分数: 6.0

CVSS v2

风险因素: Medium

基本分数: 5.5

时间分数: 4.1

矢量: CVSS2#AV:L/AC:H/Au:S/C:C/I:N/A:C

CVSS 分数来源: CVE-2024-27005

CVSS v3

风险因素: Medium

基本分数: 6.3

时间分数: 5.5

矢量: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H

时间矢量: CVSS:3.0/E:U/RL:O/RC:C

漏洞信息

CPE: p-cpe:/a:microsoft:azure_linux:hypervvssd, p-cpe:/a:microsoft:azure_linux:hyperv-tools, p-cpe:/a:microsoft:azure_linux:hyperv-daemons-debuginfo, p-cpe:/a:microsoft:azure_linux:hyperv-daemons-license, x-cpe:/o:microsoft:azure_linux, p-cpe:/a:microsoft:azure_linux:hypervfcopyd, p-cpe:/a:microsoft:azure_linux:hypervkvpd, p-cpe:/a:microsoft:azure_linux:hyperv-daemons

必需的 KB 项: Host/local_checks_enabled, Host/AzureLinux/release, Host/AzureLinux/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2024/11/12

漏洞发布日期: 2024/4/27

参考资料信息

CVE: CVE-2024-27005