Amazon Linux 2 : kernel (ALAS-2021-1685)

high Nessus Plugin ID 151793

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 4.14.238-182.421. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2-2021-1685 advisory.

2024-12-05: CVE-2021-46992 was added to this advisory.

2024-12-05: CVE-2021-47259 was added to this advisory.

2024-12-05: CVE-2021-47256 was added to this advisory.

2024-11-08: CVE-2021-47274 was added to this advisory.

2024-08-28: CVE-2021-47162 was added to this advisory.

2024-08-28: CVE-2021-47142 was added to this advisory.

2024-08-28: CVE-2021-47171 was added to this advisory.

2024-08-01: CVE-2021-46959 was added to this advisory.

2024-08-01: CVE-2021-47055 was added to this advisory.

2024-08-01: CVE-2021-47054 was added to this advisory.

2024-08-01: CVE-2021-47117 was added to this advisory.

2024-08-01: CVE-2021-47078 was added to this advisory.

2024-08-01: CVE-2021-47177 was added to this advisory.

2024-08-01: CVE-2021-47146 was added to this advisory.

2024-08-01: CVE-2021-47118 was added to this advisory.

2024-08-01: CVE-2021-47145 was added to this advisory.

2024-08-01: CVE-2021-47168 was added to this advisory.

2024-06-06: CVE-2021-47006 was added to this advisory.

2024-05-23: CVE-2021-47013 was added to this advisory.

2024-05-23: CVE-2021-46960 was added to this advisory.

2024-05-23: CVE-2021-47166 was added to this advisory.

2024-05-23: CVE-2021-46955 was added to this advisory.

2024-05-23: CVE-2021-46985 was added to this advisory.

2024-04-24: CVE-2021-46953 was added to this advisory.

2024-04-24: CVE-2021-46939 was added to this advisory.

2024-04-24: CVE-2021-46950 was added to this advisory.

2024-04-24: CVE-2021-46938 was added to this advisory.

2024-03-13: CVE-2021-46906 was added to this advisory.

A vulnerability was found in the bluez, where Passkey Entry protocol used in Secure Simple Pairing (SSP), Secure Connections (SC) and LE Secure Connections (LESC) of the Bluetooth Core Specification is vulnerable to an impersonation attack where an active attacker can impersonate the initiating device without any previous knowledge. (CVE-2020-26558)

A flaw was found in the Linux kernel. Improper access control in BlueZ may allow an authenticated user to potentially enable information disclosure via adjacent access. The highest threat from this vulnerability is to data confidentiality and integrity. (CVE-2021-0129)

A denial-of-service (DoS) flaw was identified in the Linux kernel due to an incorrect memory barrier in xt_replace_table in net/netfilter/x_tables.c in the netfilter subsystem. (CVE-2021-29650)

A flaw was found in the Linux kernel's handling of the removal of Bluetooth HCI controllers. This flaw allows an attacker with a local account to exploit a race condition, leading to corrupted memory and possible privilege escalation. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (CVE-2021-32399)

A use-after-free flaw was found in hci_send_acl in the bluetooth host controller interface (HCI) in Linux kernel, where a local attacker with an access rights could cause a denial of service problem on the system The issue results from the object hchan, freed in hci_disconn_loglink_complete_evt, yet still used in other places. The highest threat from this vulnerability is to data integrity, confidentiality and system availability. (CVE-2021-33034)

In kernel/bpf/verifier.c in the Linux kernel before 5.12.13, a branch can be mispredicted (e.g., because of type confusion) and consequently an unprivileged BPF program can read arbitrary memory locations via a side-channel attack, aka CID-9183671af6db. (CVE-2021-33624)

A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. (CVE-2021-3564)

A flaw use-after-free in function hci_sock_bound_ioctl() of the Linux kernel HCI subsystem was found in the way user calls ioct HCIUNBLOCKADDR or other way triggers race condition of the call hci_unregister_dev() together with one of the calls hci_sock_blacklist_add(), hci_sock_blacklist_del(), hci_get_conn_info(), hci_get_auth_info(). A privileged local user could use this flaw to crash the system or escalate their privileges on the system. (CVE-2021-3573)

In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: fix info leak in hid_submit_ctrl

In hid_submit_ctrl(), the way of calculating the report length doesn'ttake into account that report->size can be zero. When running thesyzkaller reproducer, a report of size 0 causes hid_submit_ctrl) tocalculate transfer_buffer_length as 16384. When this urb is passed tothe usb core layer, KMSAN reports an info leak of 16384 bytes.

To fix this, first modify hid_report_len() to account for the zeroreport size case by using DIV_ROUND_UP for the division. Then, call itfrom hid_submit_ctrl(). (CVE-2021-46906)

In the Linux kernel, the following vulnerability has been resolved:

dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails (CVE-2021-46938)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Restructure trace_clock_global() to never block (CVE-2021-46939)

In the Linux kernel, the following vulnerability has been resolved:

md/raid1: properly indicate failure when ending a failed write request

This patch addresses a data corruption bug in raid1 arrays using bitmaps.Without this fix, the bitmap bits for the failed I/O end up being cleared.

Since we are in the failure leg of raid1_end_write_request, the requesteither needs to be retried (R1BIO_WriteError) or failed (R1BIO_Degraded). (CVE-2021-46950)

In the Linux kernel, the following vulnerability has been resolved:

ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure (CVE-2021-46953)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: fix stack OOB read while fragmenting IPv4 packets (CVE-2021-46955)

In the Linux kernel, the following vulnerability has been resolved:

spi: Fix use-after-free with devm_spi_alloc_* (CVE-2021-46959)

In the Linux kernel, the following vulnerability has been resolved:

cifs: Return correct error code from smb2_get_enc_key (CVE-2021-46960)

In the Linux kernel, the following vulnerability has been resolved:

ACPI: scan: Fix a memory leak in an error handling path (CVE-2021-46985)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: avoid overflows in nft_hash_buckets() (CVE-2021-46992)

In the Linux kernel, the following vulnerability has been resolved:

ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook (CVE-2021-47006)

In the Linux kernel, the following vulnerability has been resolved:

net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (CVE-2021-47013)

In the Linux kernel, the following vulnerability has been resolved:

bus: qcom: Put child node before return (CVE-2021-47054)

In the Linux kernel, the following vulnerability has been resolved:

mtd: require write permissions for locking and badblock ioctls (CVE-2021-47055)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Clear all QP fields if creation failed (CVE-2021-47078)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed (CVE-2021-47117)

In the Linux kernel, the following vulnerability has been resolved:

pid: take a reference when initializing `cad_pid` (CVE-2021-47118)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix a use-after-free (CVE-2021-47142)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not BUG_ON in link_to_fixup_dir (CVE-2021-47145)

In the Linux kernel, the following vulnerability has been resolved:

mld: fix panic in mld_newpack() (CVE-2021-47146)

In the Linux kernel, the following vulnerability has been resolved:

tipc: skb_linearize the head skb when reassembling msgs (CVE-2021-47162)

In the Linux kernel, the following vulnerability has been resolved:

NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() (CVE-2021-47166)

In the Linux kernel, the following vulnerability has been resolved:

NFS: fix an incorrect limit in filelayout_decode_layout() (CVE-2021-47168)

In the Linux kernel, the following vulnerability has been resolved:

net: usb: fix memory leak in smsc75xx_bind (CVE-2021-47171)

In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Fix sysfs leak in alloc_iommu() (CVE-2021-47177)

In the Linux kernel, the following vulnerability has been resolved:

mm/memory-failure: make sure wait for page writeback in memory_failure (CVE-2021-47256)

In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix use-after-free in nfs4_init_client() (CVE-2021-47259)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Correct the length check which causes memory corruption (CVE-2021-47274)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALAS-2021-1685.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2020-26558.html

https://alas.aws.amazon.com/cve/html/CVE-2021-0129.html

https://alas.aws.amazon.com/cve/html/CVE-2021-3564.html

https://alas.aws.amazon.com/cve/html/CVE-2021-3573.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46906.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46938.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46939.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46950.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46953.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46955.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46959.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46960.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46985.html

https://alas.aws.amazon.com/cve/html/CVE-2021-46992.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47006.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47013.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47054.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47055.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47078.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47117.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47118.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47142.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47145.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47146.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47162.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47166.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47168.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47171.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47177.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47256.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47259.html

https://alas.aws.amazon.com/cve/html/CVE-2021-47274.html

https://alas.aws.amazon.com/cve/html/CVE-2021-29650.html

https://alas.aws.amazon.com/cve/html/CVE-2021-32399.html

https://alas.aws.amazon.com/cve/html/CVE-2021-33034.html

https://alas.aws.amazon.com/cve/html/CVE-2021-33624.html

Plugin Details

Severity: High

ID: 151793

File Name: al2_ALAS-2021-1685.nasl

Version: 1.20

Type: local

Agent: unix

Published: 7/16/2021

Updated: 12/17/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-3573

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2021-47013

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-livepatch-4.14.238-182.421, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/14/2021

Vulnerability Publication Date: 3/30/2021

Reference Information

CVE: CVE-2020-26558, CVE-2021-0129, CVE-2021-29650, CVE-2021-32399, CVE-2021-33034, CVE-2021-33624, CVE-2021-3564, CVE-2021-3573, CVE-2021-46906, CVE-2021-46938, CVE-2021-46939, CVE-2021-46950, CVE-2021-46953, CVE-2021-46955, CVE-2021-46959, CVE-2021-46960, CVE-2021-46985, CVE-2021-46992, CVE-2021-47006, CVE-2021-47013, CVE-2021-47054, CVE-2021-47055, CVE-2021-47078, CVE-2021-47117, CVE-2021-47118, CVE-2021-47142, CVE-2021-47145, CVE-2021-47146, CVE-2021-47162, CVE-2021-47166, CVE-2021-47168, CVE-2021-47171, CVE-2021-47177, CVE-2021-47256, CVE-2021-47259, CVE-2021-47274

ALAS: 2021-1685