Synopsis
The remote Amazon Linux 2 host is missing a security update.
Description
The version of kernel installed on the remote host is prior to 5.15.153-100.162. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.15-2024-041 advisory.
2024-08-27: CVE-2024-26863 was added to this advisory.
2024-08-27: CVE-2023-52656 was added to this advisory.
2024-08-27: CVE-2024-26809 was added to this advisory.
2024-08-27: CVE-2024-26878 was added to this advisory.
2024-08-27: CVE-2024-27038 was added to this advisory.
2024-08-27: CVE-2024-26862 was added to this advisory.
2024-08-27: CVE-2024-26861 was added to this advisory.
2024-08-27: CVE-2024-26816 was added to this advisory.
2024-08-27: CVE-2024-26880 was added to this advisory.
2024-08-27: CVE-2024-26901 was added to this advisory.
2024-08-27: CVE-2024-27388 was added to this advisory.
2024-08-01: CVE-2024-27390 was added to this advisory.
2024-08-01: CVE-2024-27065 was added to this advisory.
2024-08-01: CVE-2024-27025 was added to this advisory.
2024-07-03: CVE-2024-36031 was added to this advisory.
2024-05-23: CVE-2024-26898 was added to this advisory.
In the Linux kernel, the following vulnerability has been resolved:
bpf: Defer the free of inner map when necessary
When updating or deleting an inner map in map array or map htab, the mapmay still be accessed by non- sleepable program or sleepable program.However bpf_map_fd_put_ptr() decreases the ref-counter of the inner mapdirectly through bpf_map_put(), if the ref-counter is the last one(which is true for most cases), the inner map will be freed byops->map_free() in a kworker. But for now, most .map_free() callbacksdon't use synchronize_rcu() or its variants to wait for the elapse of aRCU grace period, so after the invocation of ops->map_free completes,the bpf program which is accessing the inner map may incuruse-after-free problem.
Fix the free of inner map by invoking bpf_map_free_deferred() after bothone RCU grace period and one tasks trace RCU grace period if the innermap has been removed from the outer map before. The deferment isaccomplished by using call_rcu() or call_rcu_tasks_trace() whenreleasing the last ref-counter of bpf map. The newly-added rcu_headfield in bpf_map shares the same storage space with work field toreduce the size of bpf_map. (CVE-2023-52447)
In the Linux kernel, the following vulnerability has been resolved:
io_uring: drop any code related to SCM_RIGHTS (CVE-2023-52656)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_set_pipapo: release elements in clone only from destroy path (CVE-2024-26809)
In the Linux kernel, the following vulnerability has been resolved:
x86, relocs: Ignore relocations in .notes section (CVE-2024-26816)
In the Linux kernel, the following vulnerability has been resolved:
wireguard: receive: annotate data-race around receiving_counter.counter (CVE-2024-26861)
In the Linux kernel, the following vulnerability has been resolved:
packet: annotate data-races around ignore_outgoing (CVE-2024-26862)
In the Linux kernel, the following vulnerability has been resolved:
hsr: Fix uninit-value access in hsr_get_node() (CVE-2024-26863)
In the Linux kernel, the following vulnerability has been resolved:
quota: Fix potential NULL pointer dereference (CVE-2024-26878)
In the Linux kernel, the following vulnerability has been resolved:
dm: call the resume method on internal suspend (CVE-2024-26880)
In the Linux kernel, the following vulnerability has been resolved:
aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts (CVE-2024-26898)
In the Linux kernel, the following vulnerability has been resolved:
do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901)
In the Linux kernel, the following vulnerability has been resolved:
nbd: null check for nla_nest_start (CVE-2024-27025)
In the Linux kernel, the following vulnerability has been resolved:
clk: Fix clk_core_get NULL dereference (CVE-2024-27038)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: do not compare internal table flags on updates (CVE-2024-27065)
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: fix some memleaks in gssx_dec_option_array (CVE-2024-27388)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down() (CVE-2024-27390)
In the Linux kernel, the following vulnerability has been resolved:
keys: Fix overwrite of key expiration on instantiation (CVE-2024-36031)
Tenable has extracted the preceding description block directly from the tested product security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Run 'yum update kernel' to update your system.
Plugin Details
File Name: al2_ALASKERNEL-5_15-2024-041.nasl
Agent: unix
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus
Risk Information
Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C
Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Vulnerability Information
CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-livepatch-5.15.153-100.162, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf
Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 4/10/2024
Vulnerability Publication Date: 2/22/2024
Reference Information
CVE: CVE-2023-52447, CVE-2023-52656, CVE-2024-26809, CVE-2024-26816, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26878, CVE-2024-26880, CVE-2024-26898, CVE-2024-26901, CVE-2024-27025, CVE-2024-27038, CVE-2024-27065, CVE-2024-27388, CVE-2024-27390, CVE-2024-36031