Amazon Linux 2 : kernel (ALASKERNEL-5.10-2024-072)

critical Nessus Plugin ID 210084

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.10.227-219.884. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.10-2024-072 advisory.

2025-01-31: CVE-2024-50033 was added to this advisory.

2025-01-21: CVE-2024-47701 was added to this advisory.

2025-01-21: CVE-2024-49889 was added to this advisory.

2025-01-21: CVE-2024-49884 was added to this advisory.

2025-01-21: CVE-2024-49883 was added to this advisory.

2025-01-21: CVE-2024-49995 was added to this advisory.

2025-01-21: CVE-2024-49936 was added to this advisory.

2025-01-21: CVE-2024-49882 was added to this advisory.

2025-01-21: CVE-2024-47742 was added to this advisory.

2025-01-21: CVE-2024-47757 was added to this advisory.

2025-01-21: CVE-2024-49983 was added to this advisory.

2025-01-21: CVE-2024-49860 was added to this advisory.

2025-01-21: CVE-2024-50035 was added to this advisory.

2024-12-05: CVE-2024-27017 was added to this advisory.

2024-11-08: CVE-2024-47685 was added to this advisory.

In the Linux kernel, the following vulnerability has been resolved:

inet: inet_defrag: prevent sk release while still in use (CVE-2024-26921)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: walk over current view on netlink dump (CVE-2024-27017)

In the Linux kernel, the following vulnerability has been resolved:

selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: pm: Fix uaf in __timer_delete_sync (CVE-2024-46858)

In the Linux kernel, the following vulnerability has been resolved:

fou: fix initialization of grc (CVE-2024-46865)

syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th->res1)

Use skb_put_zero() to clear the whole TCP header, as done in nf_reject_ip_tcphdr_put() (CVE-2024-47685)

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid OOB when system.data xattr changes underneath the filesystem (CVE-2024-47701)

In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Block path traversal (CVE-2024-47742)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential oob read in nilfs_btree_check_delete() (CVE-2024-47757)

In the Linux kernel, the following vulnerability has been resolved:

ACPI: sysfs: validate return type of _STR method (CVE-2024-49860)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double brelse() the buffer of the extents path (CVE-2024-49882)

In the Linux kernel, the following vulnerability has been resolved:

ext4: aovid use-after-free in ext4_ext_insert_extent() (CVE-2024-49883)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at() (CVE-2024-49884)

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid use-after-free in ext4_ext_show_leaf() (CVE-2024-49889)

In the Linux kernel, the following vulnerability has been resolved:

net/xen-netback: prevent UAF in xenvif_flush_hash() (CVE-2024-49936)

In the Linux kernel, the following vulnerability has been resolved:

ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (CVE-2024-49983)

In the Linux kernel, the following vulnerability has been resolved:

tipc: guard against string buffer overrun (CVE-2024-49995)

In the Linux kernel, the following vulnerability has been resolved:

slip: make slhc_remember() more robust against malicious packets (CVE-2024-50033)

In the Linux kernel, the following vulnerability has been resolved:

ppp: fix ppp_async_encode() illegal access (CVE-2024-50035)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-072.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26921.html

https://alas.aws.amazon.com/cve/html/CVE-2024-27017.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46695.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46858.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46865.html

https://alas.aws.amazon.com/cve/html/CVE-2024-47685.html

https://alas.aws.amazon.com/cve/html/CVE-2024-47701.html

https://alas.aws.amazon.com/cve/html/CVE-2024-47742.html

https://alas.aws.amazon.com/cve/html/CVE-2024-47757.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49860.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49882.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49883.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49884.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49889.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49936.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49983.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49995.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50033.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50035.html

Plugin Details

Severity: Critical

ID: 210084

File Name: al2_ALASKERNEL-5_10-2024-072.nasl

Version: 1.5

Type: local

Agent: unix

Published: 11/1/2024

Updated: 1/31/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.4

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C

CVSS Score Source: CVE-2024-47685

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-5.10.227-219.884, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/24/2024

Vulnerability Publication Date: 4/18/2024

Reference Information

CVE: CVE-2024-26921, CVE-2024-27017, CVE-2024-46695, CVE-2024-46858, CVE-2024-46865, CVE-2024-47685, CVE-2024-47701, CVE-2024-47742, CVE-2024-47757, CVE-2024-49860, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49889, CVE-2024-49936, CVE-2024-49983, CVE-2024-49995, CVE-2024-50033, CVE-2024-50035