CBL Mariner 2.0 Security Update: kernel (CVE-2024-47684)

medium Nessus Plugin ID 212970

Synopsis

The remote CBL Mariner host is missing one or more security updates.

Description

The version of kernel installed on the remote CBL Mariner 2.0 host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the CVE-2024-47684 advisory.

- In the Linux kernel, the following vulnerability has been resolved: tcp: check skb is non-NULL in tcp_rto_delta_us() We have some machines running stock Ubuntu 20.04.6 which is their 5.4.0-174-generic kernel that are running ceph and recently hit a null ptr dereference in tcp_rearm_rto(). Initially hitting it from the TLP path, but then later we also saw it getting hit from the RACK case as well. Here are examples of the oops messages we saw in each of those cases: July 26 15:05:02 rx [11061395.780353] BUG:
kernel NULL pointer dereference, address: 0000000000000020Julyl 26 15:05:02 rx [11061395.787572] #PF:
supervisor read access in kernel modJulyul 26 15:05:02 rx [11061395.792971] #PF: error_code(0x0000) - not- present paJulyJul 26 15:05:02 rx [11061395.798362] PGD 0 P4July Jul 26 15:05:02 rx [11061395.801164] Oops:
0000 [#1] SMP NJulyI Jul 26 15:05:02 rx [11061395.805091] CPU: 0 PID: 9180 Comm: msgr-worker-1 Tainted: G W 5.4.0-174-generic #193-UJulytu Jul 26 15:05:02 rx [11061395.814996] Hardware name: Supermicro SMC 2x26 os- gen8 64C NVME-Y 256G/H12SSW-NTR, BIOS 2.5.V1.2U.NVMe.UEFI 05/0July023 Jul 26 15:05:02 rx [11061395.825952] RIP: 0010:tcp_rearm_rto+0xeJulyx160 Jul 26 15:05:02 rx [11061395.830656] Code: 87 ca 04 00 00 00 5b 41 5c 41 5d 5d c3 c3 49 8b bc 24 40 06 00 00 eb 8d 48 bb cf f7 53 e3 a5 9b c4 20 4c 89 ef e8 0c fe 0e 00 <48> 8b 78 20 48 c1 ef 03 48 89 f8 41 8b bc 24 80 04 00 00 Julyf7 e3 Jul 26 15:05:02 rx [11061395.849665] RSP:
0018:ffffb75d40003e08 EFLAGS:July010246 Jul 26 15:05:02 rx [11061395.855149] RAX: 0000000000000000 RBX:
20c49ba5e353f7cf RCX: 000000July0000000 Jul 26 15:05:02 rx [11061395.862542] RDX: 0000000062177c30 RSI:
000000000000231c RDI: ffff9Julyad283a60 Jul 26 15:05:02 rx [11061395.869933] RBP: ffffb75d40003e20 R08:
0000000000000000 R09: ffffJuly605e20aa8 Jul 26 15:05:02 rx [11061395.877318] R10: ffffb75d40003f00 R11:
ffffb75d4460f740 R12: fffJuly74ad283900 Jul 26 15:05:02 rx [11061395.884710] R13: ffff9874ad283a60 R14:
ffff9874ad283980 R15: ffJuly874ad283d30 Jul 26 15:05:02 rx [11061395.892095] FS: 00007f1ef4a2e700(0000) GS:ffff987605e00000(0000) knlGS:0July000000000000 Jul 26 15:05:02 rx [11061395.900438] CS: 0010 DS: 0000 ES: 0000 CR0: July0000080050033 Jul 26 15:05:02 rx [11061395.906435] CR2: 0000000000000020 CR3:
0000003e450ba003 CR4:July00000000760ef0 Jul 26 15:05:02 rx [11061395.9138July PKRU: 55555554 Jul 26 15:05:02 rx [11061395.July786] Call Trace: Jul 26 15:05:02 July[11061395.919488] Jul 26 15:05:02 rx [11061395.921765] ? shoJulyegs.cold+0x1a/0x1f Jul 26 15:05:02 rx [11061395.925July] ? __die+0x90/0xd9 Jul 26 15:05:02 rx [11061395.929169] ?July_context+0x196/0x380 Jul 26 15:05:02 rx [11061395.933088] ? ip6_protocolJulyliver_rcu+0x4e0/0x4e0 Jul 26 15:05:02 rx [11061395.938216] ? ip6_subJulyt_rcv_finish+0x3d/0x50 Jul 26 15:05:02 rx [11061395.943000] ? __bad_area_Julyemaphore+0x50/0x1a0 Jul 26 15:05:02 rx [11061395.947873] ? badJulyea_nosemaphore+0x16/0x20 Jul 26 15:05:02 rx [11061395.952486] ? doJulyer_addr_fault+0x267/0x450 Jul 26 15:05:02 rx [11061395.957104July ipv6_list_rcv+0x112/0x140 Jul 26 15:05:02 rx [11061395.96127July? __do_page_fault+0x58/0x90 Jul 26 15:05:02 rx [11061395.965458July do_page_fault+0x2c/0xe0 Jul 26 15:05:02 rx [1106139July69465] ? page_fault+0x34/0x40 Jul 26 15:05:02 rx [11061395.9July17] ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.9773July ? tcp_rearm_rto+0xe4/0x160 Jul 26 15:05:02 rx [11061395.9814July tcp_send_loss_probe+0x10b/0x220 Jul 26 15:05:02 rx [11061395.985937]Julyp_write_timer_handler+0x1b4/0x240 Jul 26 15:05:02 rx [11061395.July809] tcp_write_timer+0x9e/0xe0 Jul 26 15:05:02 rx [11061395.994814] ? tcp_write_timer_handler+0x240/0x240 Jul 26 15:05:02 rx [110July95.999866] call_timer_fn+0x32/0x130 Jul 26 15:05:02 rx [11061396.0037July
__run_timers.part.0+0x180/0x280 Jul 26 15:05:02 rx [11061396.008309] ? recalibrate_cpu_khz+0x10/0x10 Jul 26 15:05:02 rx [11061396.012July] ? native_x2apic_icr_write+0x30/0x30 Jul 26 15:05:02 rx [11061396.017718] ? lapic_next_even ---truncated--- (CVE-2024-47684)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://nvd.nist.gov/vuln/detail/CVE-2024-47684

Plugin Details

Severity: Medium

ID: 212970

File Name: mariner_CVE-2024-47684.nasl

Version: 1.1

Type: local

Published: 12/13/2024

Updated: 12/13/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2024-47684

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:microsoft:cbl-mariner:python3-perf, p-cpe:/a:microsoft:cbl-mariner:kernel-devel, p-cpe:/a:microsoft:cbl-mariner:kernel-tools, p-cpe:/a:microsoft:cbl-mariner:kernel-drivers-accessibility, p-cpe:/a:microsoft:cbl-mariner:kernel-drivers-gpu, x-cpe:/o:microsoft:cbl-mariner, p-cpe:/a:microsoft:cbl-mariner:kernel, p-cpe:/a:microsoft:cbl-mariner:kernel-debuginfo, p-cpe:/a:microsoft:cbl-mariner:kernel-dtb, p-cpe:/a:microsoft:cbl-mariner:bpftool, p-cpe:/a:microsoft:cbl-mariner:kernel-docs, p-cpe:/a:microsoft:cbl-mariner:kernel-drivers-sound

Required KB Items: Host/local_checks_enabled, Host/CBLMariner/release, Host/CBLMariner/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/10/2024

Vulnerability Publication Date: 10/21/2024

Reference Information

CVE: CVE-2024-47684