ALASKERNEL-5.4-2024-069


Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2024-069
Advisory Release Date: 2024-05-23 23:02 Pacific
Advisory Updated Date: 2024-07-03 22:01 Pacific
Severity: Important

Issue Overview:

2024-07-03: CVE-2024-36904 was added to this advisory.

2024-07-03: CVE-2024-36954 was added to this advisory.

2024-07-03: CVE-2024-36940 was added to this advisory.

2024-07-03: CVE-2024-36017 was added to this advisory.

2024-07-03: CVE-2024-36886 was added to this advisory.

2024-07-03: CVE-2024-36939 was added to this advisory.

2024-07-03: CVE-2024-36902 was added to this advisory.

2024-07-03: CVE-2024-35947 was added to this advisory.

2024-07-03: CVE-2024-36883 was added to this advisory.

2024-06-19: CVE-2024-36905 was added to this advisory.

2024-06-19: CVE-2024-36959 was added to this advisory.

2024-06-19: CVE-2024-36933 was added to this advisory.

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nftables: exthdr: fix 4-byte stack OOB write

If priv->len is a multiple of 4, then dst[len / 4] can write past
the destination array which leads to stack corruption.

This construct is necessary to clean the remainder of the register
in case ->len is NOT a multiple of the register size, so make it
conditional just like nft_payload.c does.

The bug was added in 4.1 cycle and then copied/inherited when
tcp/sctp and ip option support was added.

Bug reported by Zero Day Initiative project (ZDI-CAN-21950,
ZDI-CAN-21951, ZDI-CAN-21961). (CVE-2023-52628)

In the Linux kernel, the following vulnerability has been resolved:

dyndbg: fix old BUG_ON in >control parser (CVE-2024-35947)

In the Linux kernel, the following vulnerability has been resolved:

rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (CVE-2024-36017)

In the Linux kernel, the following vulnerability has been resolved:

net: fix out-of-bounds access in ops_init (CVE-2024-36883)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix UAF in error path (CVE-2024-36886)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (CVE-2024-36902)

In the Linux kernel, the following vulnerability has been resolved:

tcp: Use refcount_inc_not_zero() in tcp_twsk_unique(). (CVE-2024-36904)

In the Linux kernel, the following vulnerability has been resolved:

tcp: defer shutdown(SEND_SHUTDOWN) for TCP_SYN_RECV sockets (CVE-2024-36905)

In the Linux kernel, the following vulnerability has been resolved:

nsh: Restore skb->{protocol,data,mac_header} for outer header in nsh_gso_segment(). (CVE-2024-36933)

In the Linux kernel, the following vulnerability has been resolved:

nfs: Handle error of rpc_proc_register() in nfs_net_init(). (CVE-2024-36939)

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: core: delete incorrect free in pinctrl_enable() (CVE-2024-36940)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix a possible memleak in tipc_buf_append (CVE-2024-36954)

In the Linux kernel, the following vulnerability has been resolved:

pinctrl: devicetree: fix refcount leak in pinctrl_dt_to_map() (CVE-2024-36959)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.4.276-189.376.amzn2.aarch64
    kernel-headers-5.4.276-189.376.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.4.276-189.376.amzn2.aarch64
    perf-5.4.276-189.376.amzn2.aarch64
    perf-debuginfo-5.4.276-189.376.amzn2.aarch64
    python-perf-5.4.276-189.376.amzn2.aarch64
    python-perf-debuginfo-5.4.276-189.376.amzn2.aarch64
    kernel-tools-5.4.276-189.376.amzn2.aarch64
    kernel-tools-devel-5.4.276-189.376.amzn2.aarch64
    kernel-tools-debuginfo-5.4.276-189.376.amzn2.aarch64
    bpftool-5.4.276-189.376.amzn2.aarch64
    bpftool-debuginfo-5.4.276-189.376.amzn2.aarch64
    kernel-devel-5.4.276-189.376.amzn2.aarch64
    kernel-debuginfo-5.4.276-189.376.amzn2.aarch64

i686:
    kernel-headers-5.4.276-189.376.amzn2.i686

src:
    kernel-5.4.276-189.376.amzn2.src

x86_64:
    kernel-5.4.276-189.376.amzn2.x86_64
    kernel-headers-5.4.276-189.376.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.4.276-189.376.amzn2.x86_64
    perf-5.4.276-189.376.amzn2.x86_64
    perf-debuginfo-5.4.276-189.376.amzn2.x86_64
    python-perf-5.4.276-189.376.amzn2.x86_64
    python-perf-debuginfo-5.4.276-189.376.amzn2.x86_64
    kernel-tools-5.4.276-189.376.amzn2.x86_64
    kernel-tools-devel-5.4.276-189.376.amzn2.x86_64
    kernel-tools-debuginfo-5.4.276-189.376.amzn2.x86_64
    bpftool-5.4.276-189.376.amzn2.x86_64
    bpftool-debuginfo-5.4.276-189.376.amzn2.x86_64
    kernel-devel-5.4.276-189.376.amzn2.x86_64
    kernel-debuginfo-5.4.276-189.376.amzn2.x86_64