Amazon Linux 2 : kernel (ALASKERNEL-5.4-2024-086)

high Nessus Plugin ID 208038

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.4.284-196.380. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.4-2024-086 advisory.

2024-10-24: CVE-2024-46828 was added to this advisory.

2024-10-24: CVE-2024-46840 was added to this advisory.

2024-10-24: CVE-2024-46822 was added to this advisory.

2024-10-24: CVE-2024-46829 was added to this advisory.

In the Linux kernel, the following vulnerability has been resolved:

ima: Fix use-after-free on a dentry's dname.name (CVE-2024-39494)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix mc_data out-of-bounds read warning (CVE-2024-46722)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix ucode out-of-bounds read warning (CVE-2024-46723)

In the Linux kernel, the following vulnerability has been resolved:

VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (CVE-2024-46738)

In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (CVE-2024-46739)

In the Linux kernel, the following vulnerability has been resolved:

of/irq: Prevent device address out-of-bounds read in interrupt map walk (CVE-2024-46743)

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: sanity check symbolic link size (CVE-2024-46744)

In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - reject requests with unreasonable number of slots (CVE-2024-46745)

In the Linux kernel, the following vulnerability has been resolved:

PCI: Add missing bridge lock to pci_bus_lock() (CVE-2024-46750)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (CVE-2024-46756)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (CVE-2024-46757)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (lm95234) Fix underflows seen when writing limit attributes (CVE-2024-46758)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (adc128d818) Fix underflows seen when writing limit attributes (CVE-2024-46759)

In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Remove proc entry when dev is unregistered. (CVE-2024-46771)

In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid excessive partition lengths (CVE-2024-46777)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: protect references to superblock parameters exposed in sysfs (CVE-2024-46780)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix missing cleanup on rollforward recovery error (CVE-2024-46781)

In the Linux kernel, the following vulnerability has been resolved:

ila: call nf_unregister_net_hooks() sooner (CVE-2024-46782)

In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: fix return value of tcp_bpf_sendmsg() (CVE-2024-46783)

In the Linux kernel, the following vulnerability has been resolved:

ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (CVE-2024-46798)

In the Linux kernel, the following vulnerability has been resolved:

sch/netem: fix use after free in netem_dequeue (CVE-2024-46800)

In the Linux kernel, the following vulnerability has been resolved:

arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (CVE-2024-46822)

In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: fix bulk flow accounting logic for host fairness (CVE-2024-46828)

In the Linux kernel, the following vulnerability has been resolved:

rtmutex: Drop rt_mutex::wait_lock before scheduling (CVE-2024-46829)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: clean up our handling of refs == 0 in snapshot delete (CVE-2024-46840)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2024-086.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2024-39494.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46722.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46723.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46738.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46739.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46743.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46744.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46745.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46750.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46756.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46757.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46758.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46759.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46771.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46777.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46780.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46781.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46782.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46783.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46798.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46800.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46822.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46828.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46829.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46840.html

Plugin Details

Severity: High

ID: 208038

File Name: al2_ALASKERNEL-5_4-2024-086.nasl

Version: 1.3

Type: local

Agent: unix

Published: 10/2/2024

Updated: 12/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-46800

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/26/2024

Vulnerability Publication Date: 7/12/2024

Reference Information

CVE: CVE-2024-39494, CVE-2024-46722, CVE-2024-46723, CVE-2024-46738, CVE-2024-46739, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46750, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46771, CVE-2024-46777, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46798, CVE-2024-46800, CVE-2024-46822, CVE-2024-46828, CVE-2024-46829, CVE-2024-46840