Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2024-068
Advisory Release Date: 2024-05-23 23:02 Pacific
Advisory Updated Date: 2024-12-05 01:00 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-12-05: CVE-2024-26754 was added to this advisory.
2024-12-05: CVE-2024-27414 was added to this advisory.
2024-09-12: CVE-2024-35807 was added to this advisory.
2024-09-12: CVE-2024-27413 was added to this advisory.
2024-08-27: CVE-2024-26773 was added to this advisory.
2024-08-27: CVE-2024-26840 was added to this advisory.
2024-08-27: CVE-2024-26752 was added to this advisory.
2024-08-27: CVE-2024-26751 was added to this advisory.
2024-08-27: CVE-2024-26835 was added to this advisory.
2024-08-27: CVE-2024-26688 was added to this advisory.
2024-08-27: CVE-2024-26804 was added to this advisory.
2024-08-27: CVE-2024-26772 was added to this advisory.
2024-08-27: CVE-2024-26763 was added to this advisory.
2024-08-27: CVE-2024-26805 was added to this advisory.
2024-08-27: CVE-2024-26764 was added to this advisory.
2024-08-27: CVE-2024-26735 was added to this advisory.
2024-08-27: CVE-2024-26848 was added to this advisory.
2024-08-27: CVE-2024-26793 was added to this advisory.
2024-08-27: CVE-2024-26791 was added to this advisory.
2024-08-27: CVE-2024-26845 was added to this advisory.
2024-07-03: CVE-2023-52504 was added to this advisory.
2024-07-03: CVE-2024-0841 was added to this advisory.
2024-06-06: CVE-2024-27417 was added to this advisory.
In the Linux kernel, the following vulnerability has been resolved:
x86/alternatives: Disable KASAN in apply_alternatives() (CVE-2023-52504)
A null pointer dereference flaw was found in the hugetlbfs_fill_super function in the Linux kernel hugetlbfs (HugeTLB pages) functionality. This issue may allow a local user to crash the system or potentially escalate their privileges on the system. (CVE-2024-0841)
In the Linux kernel, the following vulnerability has been resolved:
fs,hugetlb: fix NULL pointer dereference in hugetlbs_fill_super (CVE-2024-26688)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: sr: fix possible use-after-free and null-ptr-deref (CVE-2024-26735)
In the Linux kernel, the following vulnerability has been resolved: afs: Increase buffer size in afs_update_volume_status() The max length of volume->vid value is 20 characters. So increase idbuf[] size up to 24 to avoid overflow. Found by Linux Verification Center (linuxtesting.org) with SVACE. [DH: Actually, it's 20 + NUL, so increase it to 24 and use snprintf()] (CVE-2024-26736)
In the Linux kernel, the following vulnerability has been resolved:
ARM: ep93xx: Add terminator to gpiod_lookup_table (CVE-2024-26751)
In the Linux kernel, the following vulnerability has been resolved:
l2tp: pass correct message length to ip6_append_data (CVE-2024-26752)
In the Linux kernel, the following vulnerability has been resolved:
gtp: fix use-after-free and null-ptr-deref in gtp_genl_dump_pdp() (CVE-2024-26754)
In the Linux kernel, the following vulnerability has been resolved:
dm-crypt: don't modify the data when using authenticated encryption (CVE-2024-26763)
In the Linux kernel, the following vulnerability has been resolved:
fs/aio: Restrict kiocb_set_cancel_fn() to I/O submitted via libaio (CVE-2024-26764)
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid allocating blocks from corrupted group in ext4_mb_find_by_goal() (CVE-2024-26772)
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid allocating blocks from corrupted group in ext4_mb_try_best_found() (CVE-2024-26773)
In the Linux kernel, the following vulnerability has been resolved:
btrfs: dev-replace: properly validate device names (CVE-2024-26791)
In the Linux kernel, the following vulnerability has been resolved:
gtp: fix use-after-free and null-ptr-deref in gtp_newlink() (CVE-2024-26793)
In the Linux kernel, the following vulnerability has been resolved:
net: ip_tunnel: prevent perpetual headroom growth (CVE-2024-26804)
In the Linux kernel, the following vulnerability has been resolved:
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter (CVE-2024-26805)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: set dormant flag on hook register failure (CVE-2024-26835)
In the Linux kernel, the following vulnerability has been resolved:
cachefiles: fix memory leak in cachefiles_add_cache() (CVE-2024-26840)
In the Linux kernel, the following vulnerability has been resolved:
scsi: target: core: Add TMF to tmr_list handling (CVE-2024-26845)
In the Linux kernel, the following vulnerability has been resolved:
afs: Fix endless loop in directory parsing (CVE-2024-26848)
In the Linux kernel, the following vulnerability has been resolved:
efi/capsule-loader: fix incorrect allocation size (CVE-2024-27413)
In the Linux kernel, the following vulnerability has been resolved:
rtnetlink: fix error logic of IFLA_BRIDGE_FLAGS writing back (CVE-2024-27414)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: fix potential "struct net" leak in inet6_rtm_getaddr() (CVE-2024-27417)
In the Linux kernel, the following vulnerability has been resolved:
ext4: fix corruption during on-line resize (CVE-2024-35807)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.4.271-184.369.amzn2.aarch64
kernel-headers-5.4.271-184.369.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.4.271-184.369.amzn2.aarch64
perf-5.4.271-184.369.amzn2.aarch64
perf-debuginfo-5.4.271-184.369.amzn2.aarch64
python-perf-5.4.271-184.369.amzn2.aarch64
python-perf-debuginfo-5.4.271-184.369.amzn2.aarch64
kernel-tools-5.4.271-184.369.amzn2.aarch64
kernel-tools-devel-5.4.271-184.369.amzn2.aarch64
kernel-tools-debuginfo-5.4.271-184.369.amzn2.aarch64
bpftool-5.4.271-184.369.amzn2.aarch64
bpftool-debuginfo-5.4.271-184.369.amzn2.aarch64
kernel-devel-5.4.271-184.369.amzn2.aarch64
kernel-debuginfo-5.4.271-184.369.amzn2.aarch64
i686:
kernel-headers-5.4.271-184.369.amzn2.i686
src:
kernel-5.4.271-184.369.amzn2.src
x86_64:
kernel-5.4.271-184.369.amzn2.x86_64
kernel-headers-5.4.271-184.369.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.4.271-184.369.amzn2.x86_64
perf-5.4.271-184.369.amzn2.x86_64
perf-debuginfo-5.4.271-184.369.amzn2.x86_64
python-perf-5.4.271-184.369.amzn2.x86_64
python-perf-debuginfo-5.4.271-184.369.amzn2.x86_64
kernel-tools-5.4.271-184.369.amzn2.x86_64
kernel-tools-devel-5.4.271-184.369.amzn2.x86_64
kernel-tools-debuginfo-5.4.271-184.369.amzn2.x86_64
bpftool-5.4.271-184.369.amzn2.x86_64
bpftool-debuginfo-5.4.271-184.369.amzn2.x86_64
kernel-devel-5.4.271-184.369.amzn2.x86_64
kernel-debuginfo-5.4.271-184.369.amzn2.x86_64