Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2024-069
Advisory Release Date: 2024-05-23 23:02 Pacific
Advisory Updated Date: 2024-07-03 22:01 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-07-03: CVE-2024-36904 was added to this advisory.
2024-07-03: CVE-2024-36954 was added to this advisory.
2024-07-03: CVE-2024-36940 was added to this advisory.
2024-07-03: CVE-2024-36017 was added to this advisory.
2024-07-03: CVE-2024-36886 was added to this advisory.
2024-07-03: CVE-2024-36939 was added to this advisory.
2024-07-03: CVE-2024-36902 was added to this advisory.
2024-07-03: CVE-2024-35947 was added to this advisory.
2024-07-03: CVE-2024-36883 was added to this advisory.
2024-06-19: CVE-2024-36905 was added to this advisory.
2024-06-19: CVE-2024-36959 was added to this advisory.
2024-06-19: CVE-2024-36933 was added to this advisory.
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
If priv->len is a multiple of 4, then dst[len / 4] can write past
the destination array which leads to stack corruption.
This construct is necessary to clean the remainder of the register
in case ->len is NOT a multiple of the register size, so make it
conditional just like nft_payload.c does.
The bug was added in 4.1 cycle and then copied/inherited when
tcp/sctp and ip option support was added.
Bug reported by Zero Day Initiative project (ZDI-CAN-21950,
ZDI-CAN-21951, ZDI-CAN-21961). (CVE-2023-52628)
In the Linux kernel, the following vulnerability has been resolved:
dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)
In the Linux kernel, the following vulnerability has been resolved:
rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (CVE-2024-36017)
In the Linux kernel, the following vulnerability has been resolved:
net: fix out-of-bounds access in ops_init (CVE-2024-36883)
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix UAF in error path (CVE-2024-36886)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (CVE-2024-36902)
In the Linux kernel, the following vulnerability has been resolved:
tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904)
In the Linux kernel, the following vulnerability has been resolved:
tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (CVE-2024-36905)
In the Linux kernel, the following vulnerability has been resolved:
nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). (CVE-2024-36933)
In the Linux kernel, the following vulnerability has been resolved:
nfs: Handle error of rpc_proc_register() in nfs_net_init(). (CVE-2024-36939)
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: core: delete incorrect free in pinctrl_enable() (CVE-2024-36940)
In the Linux kernel, the following vulnerability has been resolved:
tipc: fix a possible memleak in tipc_buf_append (CVE-2024-36954)
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (CVE-2024-36959)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.4.276-189.376.amzn2.aarch64
kernel-headers-5.4.276-189.376.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.4.276-189.376.amzn2.aarch64
perf-5.4.276-189.376.amzn2.aarch64
perf-debuginfo-5.4.276-189.376.amzn2.aarch64
python-perf-5.4.276-189.376.amzn2.aarch64
python-perf-debuginfo-5.4.276-189.376.amzn2.aarch64
kernel-tools-5.4.276-189.376.amzn2.aarch64
kernel-tools-devel-5.4.276-189.376.amzn2.aarch64
kernel-tools-debuginfo-5.4.276-189.376.amzn2.aarch64
bpftool-5.4.276-189.376.amzn2.aarch64
bpftool-debuginfo-5.4.276-189.376.amzn2.aarch64
kernel-devel-5.4.276-189.376.amzn2.aarch64
kernel-debuginfo-5.4.276-189.376.amzn2.aarch64
i686:
kernel-headers-5.4.276-189.376.amzn2.i686
src:
kernel-5.4.276-189.376.amzn2.src
x86_64:
kernel-5.4.276-189.376.amzn2.x86_64
kernel-headers-5.4.276-189.376.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.4.276-189.376.amzn2.x86_64
perf-5.4.276-189.376.amzn2.x86_64
perf-debuginfo-5.4.276-189.376.amzn2.x86_64
python-perf-5.4.276-189.376.amzn2.x86_64
python-perf-debuginfo-5.4.276-189.376.amzn2.x86_64
kernel-tools-5.4.276-189.376.amzn2.x86_64
kernel-tools-devel-5.4.276-189.376.amzn2.x86_64
kernel-tools-debuginfo-5.4.276-189.376.amzn2.x86_64
bpftool-5.4.276-189.376.amzn2.x86_64
bpftool-debuginfo-5.4.276-189.376.amzn2.x86_64
kernel-devel-5.4.276-189.376.amzn2.x86_64
kernel-debuginfo-5.4.276-189.376.amzn2.x86_64