Amazon Linux 2 : kernel (ALASKERNEL-5.10-2024-070)

high Nessus Plugin ID 208045

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.10.226-214.879. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.10-2024-070 advisory.

2024-12-05: CVE-2024-38577 was added to this advisory.

2024-11-08: CVE-2024-43905 was added to this advisory.

2024-10-24: CVE-2024-46828 was added to this advisory.

2024-10-24: CVE-2024-46840 was added to this advisory.

2024-10-24: CVE-2024-46822 was added to this advisory.

2024-10-24: CVE-2024-46829 was added to this advisory.

2024-10-24: CVE-2024-46819 was added to this advisory.

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix use-after-free after failure to create a snapshot (CVE-2022-48733)

In the Linux kernel, the following vulnerability has been resolved:

rcu-tasks: Fix show_rcu_tasks_trace_gp_kthread buffer overflow (CVE-2024-38577)

In the Linux kernel, the following vulnerability has been resolved:

ima: Fix use-after-free on a dentry's dname.name (CVE-2024-39494)

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Fix the null pointer dereference for vega10_hwmgr (CVE-2024-43905)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: avoid possible UaF when selecting endp (CVE-2024-44974)

In the Linux kernel, the following vulnerability has been resolved:

perf/aux: Fix AUX buffer serialization (CVE-2024-46713)

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Skip wbscl_set_scaler_filter if filter is null (CVE-2024-46714)

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Fix null pointer dereference in trace (CVE-2024-46719)

In the Linux kernel, the following vulnerability has been resolved:

apparmor: fix possible NULL pointer dereference (CVE-2024-46721)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix mc_data out-of-bounds read warning (CVE-2024-46722)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix ucode out-of-bounds read warning (CVE-2024-46723)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds read of df_v1_7_channel_number (CVE-2024-46724)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix out-of-bounds write warning (CVE-2024-46725)

In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix the Out-of-bounds read warning (CVE-2024-46731)

In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: fix kernel crash if commands allocation fails (CVE-2024-46737)

In the Linux kernel, the following vulnerability has been resolved:

VMCI: Fix use-after-free when removing resource in vmci_resource_remove() (CVE-2024-46738)

In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Fix kernel NULL pointer dereference in hv_uio_rescind (CVE-2024-46739)

In the Linux kernel, the following vulnerability has been resolved:

of/irq: Prevent device address out-of-bounds read in interrupt map walk (CVE-2024-46743)

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: sanity check symbolic link size (CVE-2024-46744)

In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - reject requests with unreasonable number of slots (CVE-2024-46745)

In the Linux kernel, the following vulnerability has been resolved:

HID: cougar: fix slab-out-of-bounds Read in cougar_report_fixup (CVE-2024-46747)

In the Linux kernel, the following vulnerability has been resolved:

PCI: Add missing bridge lock to pci_bus_lock() (CVE-2024-46750)

In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Do not return unused priv in mwifiex_get_priv_by_id() (CVE-2024-46755)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83627ehf) Fix underflows seen when writing limit attributes (CVE-2024-46756)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (nct6775-core) Fix underflows seen when writing limit attributes (CVE-2024-46757)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (lm95234) Fix underflows seen when writing limit attributes (CVE-2024-46758)

In the Linux kernel, the following vulnerability has been resolved:

hwmon: (adc128d818) Fix underflows seen when writing limit attributes (CVE-2024-46759)

In the Linux kernel, the following vulnerability has been resolved:

can: bcm: Remove proc entry when dev is unregistered. (CVE-2024-46771)

In the Linux kernel, the following vulnerability has been resolved:

udf: Avoid excessive partition lengths (CVE-2024-46777)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: protect references to superblock parameters exposed in sysfs (CVE-2024-46780)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix missing cleanup on rollforward recovery error (CVE-2024-46781)

In the Linux kernel, the following vulnerability has been resolved:

ila: call nf_unregister_net_hooks() sooner (CVE-2024-46782)

In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: fix return value of tcp_bpf_sendmsg() (CVE-2024-46783)

In the Linux kernel, the following vulnerability has been resolved:

ASoC: dapm: Fix UAF for snd_soc_pcm_runtime object (CVE-2024-46798)

In the Linux kernel, the following vulnerability has been resolved:

sch/netem: fix use after free in netem_dequeue (CVE-2024-46800)

In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: the warning dereferencing obj for nbio_v7_4 (CVE-2024-46819)

In the Linux kernel, the following vulnerability has been resolved:

arm64: acpi: Harden get_cpu_for_acpi_id() against missing CPU entry (CVE-2024-46822)

In the Linux kernel, the following vulnerability has been resolved:

sched: sch_cake: fix bulk flow accounting logic for host fairness (CVE-2024-46828)

In the Linux kernel, the following vulnerability has been resolved:

rtmutex: Drop rt_mutex::wait_lock before scheduling (CVE-2024-46829)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: clean up our handling of refs == 0 in snapshot delete (CVE-2024-46840)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-070.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2022-48733.html

https://alas.aws.amazon.com/cve/html/CVE-2024-38577.html

https://alas.aws.amazon.com/cve/html/CVE-2024-39494.html

https://alas.aws.amazon.com/cve/html/CVE-2024-43905.html

https://alas.aws.amazon.com/cve/html/CVE-2024-44974.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46713.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46714.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46719.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46721.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46722.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46723.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46724.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46725.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46731.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46737.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46738.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46739.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46743.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46744.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46745.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46747.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46750.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46755.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46756.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46757.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46758.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46759.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46771.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46777.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46780.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46781.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46782.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46783.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46798.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46800.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46829.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46840.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46819.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46822.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46828.html

Plugin Details

Severity: High

ID: 208045

File Name: al2_ALASKERNEL-5_10-2024-070.nasl

Version: 1.4

Type: local

Agent: unix

Published: 10/2/2024

Updated: 12/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-46800

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.226-214.879, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 9/26/2024

Vulnerability Publication Date: 6/20/2024

Reference Information

CVE: CVE-2022-48733, CVE-2024-38577, CVE-2024-39494, CVE-2024-43905, CVE-2024-44974, CVE-2024-46713, CVE-2024-46714, CVE-2024-46719, CVE-2024-46721, CVE-2024-46722, CVE-2024-46723, CVE-2024-46724, CVE-2024-46725, CVE-2024-46731, CVE-2024-46737, CVE-2024-46738, CVE-2024-46739, CVE-2024-46743, CVE-2024-46744, CVE-2024-46745, CVE-2024-46747, CVE-2024-46750, CVE-2024-46755, CVE-2024-46756, CVE-2024-46757, CVE-2024-46758, CVE-2024-46759, CVE-2024-46771, CVE-2024-46777, CVE-2024-46780, CVE-2024-46781, CVE-2024-46782, CVE-2024-46783, CVE-2024-46798, CVE-2024-46800, CVE-2024-46819, CVE-2024-46822, CVE-2024-46828, CVE-2024-46829, CVE-2024-46840