Amazon Linux 2 : kernel (ALASKERNEL-5.4-2025-091)

high Nessus Plugin ID 214616

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

The version of kernel installed on the remote host is prior to 5.4.288-202.389. It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2KERNEL-5.4-2025-091 advisory.

In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix fortify source warning while accessing Eth segment (CVE-2024-26907)

In the Linux kernel, the following vulnerability has been resolved:

i3c: Use i3cdev->desc->info instead of calling i3c_device_get_info() to avoid deadlock (CVE-2024-43098)

In the Linux kernel, the following vulnerability has been resolved:

bcache: revert replacing IS_ERR_OR_NULL with IS_ERR again (CVE-2024-48881)

In the Linux kernel, the following vulnerability has been resolved:

igb: Fix potential invalid memory access in igb_init_module() (CVE-2024-52332)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fs, lock FTE when checking if active (CVE-2024-53121)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in block_dirty_buffer tracepoint (CVE-2024-53130)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix null-ptr-deref in block_touch_buffer tracepoint (CVE-2024-53131)

In the Linux kernel, the following vulnerability has been resolved:

KVM: VMX: Bury Intel PT virtualization (guest/host mode) behind CONFIG_BROKEN (CVE-2024-53135)

In the Linux kernel, the following vulnerability has been resolved:

mm: revert mm: shmem: fix data-race in shmem_getattr() (CVE-2024-53136)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: kTLS, Fix incorrect page refcounting (CVE-2024-53138)

In the Linux kernel, the following vulnerability has been resolved:

netlink: terminate outstanding dump on socket close (CVE-2024-53140)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: add missing range check in bitmap_ip_uadt (CVE-2024-53141)

In the Linux kernel, the following vulnerability has been resolved:

initramfs: avoid filename buffer overrun (CVE-2024-53142)

In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent a potential integer overflow (CVE-2024-53146)

In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scpi: Check the DVFS OPP count returned by the firmware (CVE-2024-53157)

In the Linux kernel, the following vulnerability has been resolved:

ubi: fastmap: Fix duplicate slab cache names while attaching (CVE-2024-53172)

In the Linux kernel, the following vulnerability has been resolved:

NFSv4.0: Fix a use-after-free problem in the asynchronous open() (CVE-2024-53173)

In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: make sure cache entry active before cache_show (CVE-2024-53174)

In the Linux kernel, the following vulnerability has been resolved:

PCI: Fix use-after-free of slot->bus on hot remove (CVE-2024-53194)

In the Linux kernel, the following vulnerability has been resolved:

xen: Fix the issue of resource not being properly released in xenbus_dev_probe() (CVE-2024-53198)

In the Linux kernel, the following vulnerability has been resolved:

vfio/pci: Properly hide first-in-list PCIe extended capability (CVE-2024-53214)

In the Linux kernel, the following vulnerability has been resolved:

NFSD: Prevent NULL dereference in nfsd4_process_cb_update() (CVE-2024-53217)

In the Linux kernel, the following vulnerability has been resolved:

xen/netfront: fix crash when removing device (CVE-2024-53240)

In the Linux kernel, the following vulnerability has been resolved:

ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (CVE-2024-53680)

In the Linux kernel, the following vulnerability has been resolved:

hfsplus: don't query the device logical block size multiple times (CVE-2024-56548)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: make sure exp active before svc_export_show (CVE-2024-56558)

In the Linux kernel, the following vulnerability has been resolved:

i3c: master: Fix miss free init_dyn_addr at i3c_master_put_i3c_addrs() (CVE-2024-56562)

In the Linux kernel, the following vulnerability has been resolved:

ovl: Filter invalid inodes with missing lookup function (CVE-2024-56570)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: ref-verify: fix use-after-free after invalid ref action (CVE-2024-56581)

In the Linux kernel, the following vulnerability has been resolved:

leds: class: Protect brightness_show() with led_cdev->led_access mutex (CVE-2024-56587)

In the Linux kernel, the following vulnerability has been resolved:

net: inet6: do not leave a dangling sk pointer in inet6_create() (CVE-2024-56600)

In the Linux kernel, the following vulnerability has been resolved:

net: inet: do not leave a dangling sk pointer in inet_create() (CVE-2024-56601)

In the Linux kernel, the following vulnerability has been resolved:

net: af_can: do not leave a dangling sk pointer in can_create() (CVE-2024-56603)

In the Linux kernel, the following vulnerability has been resolved:

af_packet: avoid erroring out after sock_init_data() in packet_create() (CVE-2024-56606)

In the Linux kernel, the following vulnerability has been resolved:

bpf: fix OOB devmap writes when deleting elements (CVE-2024-56615)

In the Linux kernel, the following vulnerability has been resolved:

nilfs2: fix potential out-of-bounds memory access in nilfs_find_entry() (CVE-2024-56619)

In the Linux kernel, the following vulnerability has been resolved:

HID: wacom: fix when get product name maybe null pointer (CVE-2024-56629)

In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg (CVE-2024-56633)

In the Linux kernel, the following vulnerability has been resolved:

gpio: grgpio: Add NULL check in grgpio_probe (CVE-2024-56634)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ipset: Hold module reference while requesting a module (CVE-2024-56637)

In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free of kernel socket in cleanup_bearer(). (CVE-2024-56642)

In the Linux kernel, the following vulnerability has been resolved:

dccp: Fix memory leak in dccp_feat_change_recv (CVE-2024-56643)

In the Linux kernel, the following vulnerability has been resolved:

net/ipv6: release expired exception dst cached in socket (CVE-2024-56644)

In the Linux kernel, the following vulnerability has been resolved:

can: j1939: j1939_session_new(): fix skb reference counting (CVE-2024-56645)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: fix LED ID check in led_tg_check() (CVE-2024-56650)

In the Linux kernel, the following vulnerability has been resolved:

sunrpc: clear XPRT_SOCK_UPD_TIMEOUT when reset transport (CVE-2024-56688)

In the Linux kernel, the following vulnerability has been resolved:

crypto: pcrypt - Call crypto layer directly when padata_do_parallel() return -EBUSY (CVE-2024-56690)

In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Several fixes to bpf_msg_pop_data (CVE-2024-56720)

In the Linux kernel, the following vulnerability has been resolved:

rtc: check if __rtc_read_time was successful in rtc_timer_do_work() (CVE-2024-56739)

In the Linux kernel, the following vulnerability has been resolved:

scsi: qedi: Fix a possible memory leak in qedi_alloc_and_init_sb() (CVE-2024-56747)

In the Linux kernel, the following vulnerability has been resolved:

scsi: qedf: Fix a possible memory leak in qedf_alloc_and_init_sb() (CVE-2024-56748)

In the Linux kernel, the following vulnerability has been resolved:

nvme-pci: fix freeing of the HMB descriptor table (CVE-2024-56756)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: netem: account for backlog updates from child qdisc (CVE-2024-56770)

In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix nfs4_openowner leak when concurrent nfsd4_open occur (CVE-2024-56779)

In the Linux kernel, the following vulnerability has been resolved:

quota: flush quota_release_work upon quota writeback (CVE-2024-56780)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update kernel' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-091.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2024-26907.html

https://alas.aws.amazon.com/cve/html/CVE-2024-43098.html

https://alas.aws.amazon.com/cve/html/CVE-2024-48881.html

https://alas.aws.amazon.com/cve/html/CVE-2024-52332.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53121.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53130.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53131.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53135.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53136.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53138.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53140.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53141.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53142.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53146.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53157.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53172.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53173.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53174.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53194.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53198.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53214.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53217.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53240.html

https://alas.aws.amazon.com/cve/html/CVE-2024-53680.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56548.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56558.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56562.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56570.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56581.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56587.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56600.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56601.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56603.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56606.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56615.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56619.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56629.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56633.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56634.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56637.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56642.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56643.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56644.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56645.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56650.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56688.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56690.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56720.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56739.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56747.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56748.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56756.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56770.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56779.html

https://alas.aws.amazon.com/cve/html/CVE-2024-56780.html

Plugin Details

Severity: High

ID: 214616

File Name: al2_ALASKERNEL-5_4-2025-091.nasl

Version: 1.4

Type: local

Agent: unix

Published: 1/24/2025

Updated: 3/14/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2024-56642

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:python-perf-debuginfo, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-headers, cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:python-perf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 1/21/2025

Vulnerability Publication Date: 4/12/2024

Reference Information

CVE: CVE-2024-26907, CVE-2024-43098, CVE-2024-48881, CVE-2024-52332, CVE-2024-53121, CVE-2024-53130, CVE-2024-53131, CVE-2024-53135, CVE-2024-53136, CVE-2024-53138, CVE-2024-53140, CVE-2024-53141, CVE-2024-53142, CVE-2024-53146, CVE-2024-53157, CVE-2024-53172, CVE-2024-53173, CVE-2024-53174, CVE-2024-53194, CVE-2024-53198, CVE-2024-53214, CVE-2024-53217, CVE-2024-53240, CVE-2024-53680, CVE-2024-56548, CVE-2024-56558, CVE-2024-56562, CVE-2024-56570, CVE-2024-56581, CVE-2024-56587, CVE-2024-56600, CVE-2024-56601, CVE-2024-56603, CVE-2024-56606, CVE-2024-56615, CVE-2024-56619, CVE-2024-56629, CVE-2024-56633, CVE-2024-56634, CVE-2024-56637, CVE-2024-56642, CVE-2024-56643, CVE-2024-56644, CVE-2024-56645, CVE-2024-56650, CVE-2024-56688, CVE-2024-56690, CVE-2024-56720, CVE-2024-56739, CVE-2024-56747, CVE-2024-56748, CVE-2024-56756, CVE-2024-56770, CVE-2024-56779, CVE-2024-56780