Amazon Linux 2023 : bpftool, kernel, kernel-devel (ALAS2023-2025-794)

critical Nessus Plugin ID 213679

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2025-794 advisory.

2025-01-16: CVE-2024-49883 was added to this advisory.

2025-01-16: CVE-2024-49882 was added to this advisory.

2025-01-16: CVE-2024-50150 was added to this advisory.

2025-01-16: CVE-2024-50186 was added to this advisory.

2025-01-16: CVE-2023-52751 was added to this advisory.

2025-01-16: CVE-2024-50127 was added to this advisory.

2025-01-16: CVE-2024-49855 was added to this advisory.

2025-01-16: CVE-2024-47742 was added to this advisory.

2025-01-16: CVE-2024-46695 was added to this advisory.

2025-01-16: CVE-2024-50131 was added to this advisory.

2025-01-16: CVE-2024-49983 was added to this advisory.

2025-01-16: CVE-2024-50154 was added to this advisory.

2025-01-16: CVE-2024-50088 was added to this advisory.

2025-01-16: CVE-2024-49936 was added to this advisory.

2025-01-16: CVE-2024-50151 was added to this advisory.

2025-01-16: CVE-2024-38632 was added to this advisory.

2025-01-16: CVE-2024-49884 was added to this advisory.

2025-01-16: CVE-2024-47701 was added to this advisory.

2025-01-16: CVE-2024-49889 was added to this advisory.

2025-01-16: CVE-2024-50155 was added to this advisory.

2025-01-16: CVE-2024-35963 was added to this advisory.

2025-01-16: CVE-2024-49860 was added to this advisory.

2025-01-16: CVE-2024-47685 was added to this advisory.

2025-01-16: CVE-2024-50143 was added to this advisory.

2025-01-16: CVE-2024-50128 was added to this advisory.

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in smb2_query_info_compound() (CVE-2023-52751)

In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sock: Fix not validating setsockopt user input (CVE-2024-35963)

In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: fix potential memory leak in vfio_intx_enable() (CVE-2024-38632)

In the Linux kernel, the following vulnerability has been resolved:

selinux,smack: don't bypass permissions check in inode_setsecctx hook (CVE-2024-46695)

syzbot reported that nf_reject_ip6_tcphdr_put() was possibly sending garbage on the four reserved tcp bits (th->res1)

Use skb_put_zero() to clear the whole TCP header, as done in nf_reject_ip_tcphdr_put() (CVE-2024-47685)

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid OOB when system.data xattr changes underneath the filesystem (CVE-2024-47701)

In the Linux kernel, the following vulnerability has been resolved:

firmware_loader: Block path traversal (CVE-2024-47742)

In the Linux kernel, the following vulnerability has been resolved:

nbd: fix race between timeout and normal completion (CVE-2024-49855)

In the Linux kernel, the following vulnerability has been resolved:

ACPI: sysfs: validate return type of _STR method (CVE-2024-49860)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix double brelse() the buffer of the extents path (CVE-2024-49882)

In the Linux kernel, the following vulnerability has been resolved:

ext4: aovid use-after-free in ext4_ext_insert_extent() (CVE-2024-49883)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix slab-use-after-free in ext4_split_extent_at() (CVE-2024-49884)

In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid use-after-free in ext4_ext_show_leaf() (CVE-2024-49889)

In the Linux kernel, the following vulnerability has been resolved:

net/xen-netback: prevent UAF in xenvif_flush_hash() (CVE-2024-49936)

In the Linux kernel, the following vulnerability has been resolved:

ext4: drop ppath from ext4_ext_replay_update_ex() to avoid double-free (CVE-2024-49983)

In the Linux kernel, the following vulnerability has been resolved:

tcp: fix mptcp DSS corruption due to large pmtu xmit (CVE-2024-50083)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix uninitialized pointer free in add_inode_ref() (CVE-2024-50088)

In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix use-after-free in taprio_change() (CVE-2024-50127)

In the Linux kernel, the following vulnerability has been resolved:

net: wwan: fix global oob in wwan_rtnl_policy (CVE-2024-50128)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Consider the NULL character when validating the event length (CVE-2024-50131)

In the Linux kernel, the following vulnerability has been resolved:

udf: fix uninit-value use in udf_get_fileshortad (CVE-2024-50143)

In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmode should keep reference to parent (CVE-2024-50150)

In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix OOBs when building SMB2_IOCTL request (CVE-2024-50151)

In the Linux kernel, the following vulnerability has been resolved:

tcp/dccp: Don't use timer_pending() in reqsk_queue_unlink(). (CVE-2024-50154)

In the Linux kernel, the following vulnerability has been resolved:

netdevsim: use cond_resched() in nsim_dev_trap_report_work() (CVE-2024-50155)

In the Linux kernel, the following vulnerability has been resolved:

net: explicitly clear the sk pointer, when pf->create fails (CVE-2024-50186)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

See Also

https://alas.aws.amazon.com/AL2023/ALAS-2025-794.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52751.html

https://alas.aws.amazon.com/cve/html/CVE-2024-35963.html

https://alas.aws.amazon.com/cve/html/CVE-2024-38632.html

https://alas.aws.amazon.com/cve/html/CVE-2024-46695.html

https://alas.aws.amazon.com/cve/html/CVE-2024-47685.html

https://alas.aws.amazon.com/cve/html/CVE-2024-47701.html

https://alas.aws.amazon.com/cve/html/CVE-2024-47742.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49855.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49860.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49882.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49883.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49884.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49889.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49936.html

https://alas.aws.amazon.com/cve/html/CVE-2024-49983.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50083.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50088.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50127.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50128.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50131.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50143.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50150.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50151.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50154.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50155.html

https://alas.aws.amazon.com/cve/html/CVE-2024-50186.html

Plugin Details

Severity: Critical

ID: 213679

File Name: al2023_ALAS2023-2025-794.nasl

Version: 1.2

Type: local

Agent: unix

Published: 1/9/2025

Updated: 1/22/2025

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.4

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:C

CVSS Score Source: CVE-2024-47685

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-modules-extra-common, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-modules-extra, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.115-126.197, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/6/2025

Vulnerability Publication Date: 10/29/2024

Reference Information

CVE: CVE-2023-52751, CVE-2024-35963, CVE-2024-38632, CVE-2024-46695, CVE-2024-47685, CVE-2024-47701, CVE-2024-47742, CVE-2024-49855, CVE-2024-49860, CVE-2024-49882, CVE-2024-49883, CVE-2024-49884, CVE-2024-49889, CVE-2024-49936, CVE-2024-49983, CVE-2024-50083, CVE-2024-50088, CVE-2024-50127, CVE-2024-50128, CVE-2024-50131, CVE-2024-50143, CVE-2024-50150, CVE-2024-50151, CVE-2024-50154, CVE-2024-50155, CVE-2024-50186