Amazon Linux 2023 : bpftool, kernel, kernel-devel (ALAS2023-2024-696)

high Nessus Plugin ID 205093

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2024-696 advisory.

2024-09-12: CVE-2024-35827 was added to this advisory.

2024-09-12: CVE-2024-35823 was added to this advisory.

2024-09-12: CVE-2024-35800 was added to this advisory.

2024-09-12: CVE-2024-35804 was added to this advisory.

2024-09-12: CVE-2024-35815 was added to this advisory.

2024-09-12: CVE-2024-35826 was added to this advisory.

2024-08-14: CVE-2024-23307 was added to this advisory.

2024-08-14: CVE-2024-25742 was added to this advisory.

2024-08-14: CVE-2024-26865 was added to this advisory.

2024-08-14: CVE-2024-26862 was added to this advisory.

2024-08-14: CVE-2024-26585 was added to this advisory.

2024-08-14: CVE-2024-26815 was added to this advisory.

2024-08-14: CVE-2024-35805 was added to this advisory.

2024-08-14: CVE-2024-26863 was added to this advisory.

2024-08-14: CVE-2024-26643 was added to this advisory.

2024-08-14: CVE-2024-26878 was added to this advisory.

2024-08-14: CVE-2024-26812 was added to this advisory.

2024-08-14: CVE-2024-26584 was added to this advisory.

2024-08-14: CVE-2024-27388 was added to this advisory.

2024-08-14: CVE-2024-26642 was added to this advisory.

2024-08-14: CVE-2024-36031 was added to this advisory.

2024-08-14: CVE-2024-35801 was added to this advisory.

2024-08-14: CVE-2024-26880 was added to this advisory.

2024-08-14: CVE-2024-26810 was added to this advisory.

2024-08-14: CVE-2024-27038 was added to this advisory.

2024-08-14: CVE-2023-52656 was added to this advisory.

2024-08-14: CVE-2024-26898 was added to this advisory.

2024-08-14: CVE-2024-26861 was added to this advisory.

2024-08-14: CVE-2024-35809 was added to this advisory.

2024-08-14: CVE-2024-27437 was added to this advisory.

2024-08-14: CVE-2024-26809 was added to this advisory.

2024-08-14: CVE-2024-26883 was added to this advisory.

2024-08-14: CVE-2024-26901 was added to this advisory.

2024-08-14: CVE-2024-26816 was added to this advisory.

2024-08-14: CVE-2024-26868 was added to this advisory.

In the Linux kernel, the following vulnerability has been resolved:

io_uring: drop any code related to SCM_RIGHTS (CVE-2023-52656)

Integer Overflow or Wraparound vulnerability in Linux kernel on x86 and ARM (md, raid, raid5 modules) allows Forced Integer Overflow. (CVE-2024-23307)

A malicious hypervisor can potentially break confidentiality and integrity of Linux SEV-SNP guests by injecting interrupts. (CVE-2024-25742)

In the Linux kernel, the following vulnerability has been resolved:

net: tls: handle backlogging of crypto requests

Since we're setting the CRYPTO_TFM_REQ_MAY_BACKLOG flag on ourrequests to the crypto API, crypto_aead_{encrypt,decrypt} can return-EBUSY instead of -EINPROGRESS in valid situations. For example, whenthe cryptd queue for AESNI is full (easy to trigger with anartificially low cryptd.cryptd_max_cpu_qlen), requests will be enqueuedto the backlog but still processed. In that case, the async callbackwill also be called twice: first with err == -EINPROGRESS, which itseems we can just ignore, then with err == 0.

Compared to Sabrina's original patch this version uses the newtls_*crypt_async_wait() helpers and converts the EBUSY toEINPROGRESS to avoid having to modify all the error handlingpaths. The handling is identical.
(CVE-2024-26584)

In the Linux kernel, the following vulnerability has been resolved:

tls: fix race between tx work scheduling and socket close

Similarly to previous commit, the submitting thread (recvmsg/sendmsg)may exit as soon as the async crypto handler calls complete().Reorder scheduling the work before calling complete().This seems more logical in the first place, as it'sthe inverse order of what the submitting thread will do. (CVE-2024-26585)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: disallow anonymous set with timeout flag (CVE-2024-26642)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout (CVE-2024-26643)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: release elements in clone only from destroy path (CVE-2024-26809)

In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Lock external INTx masking ops (CVE-2024-26810)

In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Create persistent INTx handler (CVE-2024-26812)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: taprio: proper TCA_TAPRIO_TC_ENTRY_INDEX check (CVE-2024-26815)

In the Linux kernel, the following vulnerability has been resolved:

x86, relocs: Ignore relocations in .notes section (CVE-2024-26816)

In the Linux kernel, the following vulnerability has been resolved:

wireguard: receive: annotate data-race around receiving_counter.counter (CVE-2024-26861)

In the Linux kernel, the following vulnerability has been resolved:

packet: annotate data-races around ignore_outgoing (CVE-2024-26862)

In the Linux kernel, the following vulnerability has been resolved:

hsr: Fix uninit-value access in hsr_get_node() (CVE-2024-26863)

In the Linux kernel, the following vulnerability has been resolved: rds: tcp: Fix use-after-free of net in reqsk_timer_handler(). syzkaller reported a warning of netns tracker [0] followed by KASAN splat [1] and another ref tracker warning [1]. syzkaller could not find a repro, but in the log, the only suspicious sequence was as follows: 18:26:22 executing program 1: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ...
connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4001, 0x0, @loopback}, 0x1c) (async) The notable thing here is 0x4001 in connect(), which is RDS_TCP_PORT. (CVE-2024-26865)

In the Linux kernel, the following vulnerability has been resolved:

nfs: fix panic when nfs4_ff_layout_prepare_ds() fails (CVE-2024-26868)

In the Linux kernel, the following vulnerability has been resolved:

quota: Fix potential NULL pointer dereference (CVE-2024-26878)

In the Linux kernel, the following vulnerability has been resolved:

dm: call the resume method on internal suspend (CVE-2024-26880)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check on 32-bit arches (CVE-2024-26883)

In the Linux kernel, the following vulnerability has been resolved:

aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts (CVE-2024-26898)

In the Linux kernel, the following vulnerability has been resolved:

do_sys_name_to_handle(): use kzalloc() to fix kernel-infoleak (CVE-2024-26901)

In the Linux kernel, the following vulnerability has been resolved:

USB: core: Fix deadlock in port disable sysfs attribute (CVE-2024-26933)

In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Fix unremoved procfs host directory regression (CVE-2024-26935)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/bios: Tolerate devdata==NULL in intel_bios_encoder_supports_dp_dual_mode() (CVE-2024-26938)

In the Linux kernel, the following vulnerability has been resolved:

kprobes/x86: Use copy_from_kernel_nofault() to read from unsafe address (CVE-2024-26946)

In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: access device through ctx instead of peer (CVE-2024-26950)

In the Linux kernel, the following vulnerability has been resolved:

wireguard: netlink: check for dangling peer via is_dead instead of empty list (CVE-2024-26951)

In the Linux kernel, the following vulnerability has been resolved:

nfs: fix UAF in direct writes (CVE-2024-26958)

In the Linux kernel, the following vulnerability has been resolved:

mm: swap: fix race between free_swap_and_cache() and swapoff() (CVE-2024-26960)

In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Add error handling in xhci_map_urb_for_dma (CVE-2024-26964)

In the Linux kernel, the following vulnerability has been resolved:

KVM: Always flush async #PF workqueue when vCPU is being destroyed (CVE-2024-26976)

In the Linux kernel, the following vulnerability has been resolved:

pci_iounmap(): Fix MMIO mapping leak (CVE-2024-26977)

In the Linux kernel, the following vulnerability has been resolved:

nbd: null check for nla_nest_start (CVE-2024-27025)

In the Linux kernel, the following vulnerability has been resolved:

clk: Fix clk_core_get NULL dereference (CVE-2024-27038)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: do not compare internal table flags on updates (CVE-2024-27065)

In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: fix some memleaks in gssx_dec_option_array (CVE-2024-27388)

In the Linux kernel, the following vulnerability has been resolved:

pstore: inode: Only d_invalidate() is needed (CVE-2024-27389)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: remove one synchronize_net() barrier in ipv6_mc_down() (CVE-2024-27390)

In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Disable auto-enable of exclusive INTx IRQ (CVE-2024-27437)

In the Linux kernel, the following vulnerability has been resolved:

efi: fix panic in kdump kernel (CVE-2024-35800)

In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Keep xfd_state in sync with MSR_IA32_XFD (CVE-2024-35801)

In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Mark target gfn of emulated atomic instruction as dirty (CVE-2024-35804)

In the Linux kernel, the following vulnerability has been resolved:

dm snapshot: fix lockup in dm_exception_table_exit (CVE-2024-35805)

In the Linux kernel, the following vulnerability has been resolved:

PCI/PM: Drain runtime-idle callbacks before driver removal (CVE-2024-35809)

In the Linux kernel, the following vulnerability has been resolved:

fs/aio: Check IOCB_AIO_RW before the struct aio_kiocb conversion (CVE-2024-35815)

In the Linux kernel, the following vulnerability has been resolved:

vt: fix unicode buffer corruption when deleting characters (CVE-2024-35823)

In the Linux kernel, the following vulnerability has been resolved:

block: Fix page refcounts for unaligned buffers in __bio_release_pages() (CVE-2024-35826)

In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: fix overflow check in io_recvmsg_mshot_prep() (CVE-2024-35827)

In the Linux kernel, the following vulnerability has been resolved:

keys: Fix overwrite of key expiration on instantiation (CVE-2024-36031)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel --releasever 2023.5.20240805' to update your system.

See Also

https://alas.aws.amazon.com/AL2023/ALAS-2024-696.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52656.html

https://alas.aws.amazon.com/cve/html/CVE-2024-23307.html

https://alas.aws.amazon.com/cve/html/CVE-2024-25742.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26584.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26585.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26642.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26643.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26809.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26810.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26812.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26815.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26816.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26861.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26862.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26863.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26865.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26868.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26878.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26880.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26883.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26898.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26901.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26933.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26935.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26938.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26946.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26950.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26951.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26958.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26960.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26964.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26976.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26977.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27025.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27038.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27065.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27388.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27389.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27390.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27437.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35800.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35801.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35804.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35805.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35809.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35815.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35823.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35826.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35827.html

https://alas.aws.amazon.com/cve/html/CVE-2024-36031.html

Plugin Details

Severity: High

ID: 205093

File Name: al2023_ALAS2023-2024-696.nasl

Version: 1.4

Type: local

Agent: unix

Published: 8/6/2024

Updated: 9/13/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-26933

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.84-99.169, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 8/1/2024

Vulnerability Publication Date: 5/1/2024

Reference Information

CVE: CVE-2023-52656, CVE-2024-23307, CVE-2024-25742, CVE-2024-26584, CVE-2024-26585, CVE-2024-26642, CVE-2024-26643, CVE-2024-26809, CVE-2024-26810, CVE-2024-26812, CVE-2024-26815, CVE-2024-26816, CVE-2024-26861, CVE-2024-26862, CVE-2024-26863, CVE-2024-26865, CVE-2024-26868, CVE-2024-26878, CVE-2024-26880, CVE-2024-26883, CVE-2024-26898, CVE-2024-26901, CVE-2024-26933, CVE-2024-26935, CVE-2024-26938, CVE-2024-26946, CVE-2024-26950, CVE-2024-26951, CVE-2024-26958, CVE-2024-26960, CVE-2024-26964, CVE-2024-26976, CVE-2024-26977, CVE-2024-27025, CVE-2024-27038, CVE-2024-27065, CVE-2024-27388, CVE-2024-27389, CVE-2024-27390, CVE-2024-27437, CVE-2024-35800, CVE-2024-35801, CVE-2024-35804, CVE-2024-35805, CVE-2024-35809, CVE-2024-35815, CVE-2024-35823, CVE-2024-35826, CVE-2024-35827, CVE-2024-36031