Amazon Linux AMI update for kernel



Published: 2024-07-02
Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2024-36905
CVE-2024-36916
CVE-2024-36933
CVE-2024-36959
CWE-ID CWE-362
CWE-125
CWE-908
CWE-200
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

kernel
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Race condition

EUVDB-ID: #VU93375

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36905

CWE-ID: CWE-362 - Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a race condition within the tcp_send_fin() function in net/ipv4/tcp_output.c, within the tcp_rcv_state_process() function in net/ipv4/tcp_input.c, within the tcp_shutdown() and __tcp_close() functions in net/ipv4/tcp.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.aarch64
    perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-6.1.91-99.172.amzn2023.aarch64
    kernel-headers-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-6.1.91-99.172.amzn2023.aarch64
    perf-6.1.91-99.172.amzn2023.aarch64
    python3-perf-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.91-99.172.amzn2023.aarch64
    kernel-devel-6.1.91-99.172.amzn2023.aarch64

src:
    kernel-6.1.91-99.172.amzn2023.src

x86_64:
    bpftool-6.1.91-99.172.amzn2023.x86_64
    python3-perf-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.x86_64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.x86_64
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.x86_64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-6.1.91-99.172.amzn2023.x86_64
    perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-6.1.91-99.172.amzn2023.x86_64
    kernel-headers-6.1.91-99.172.amzn2023.x86_64
    perf-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.91-99.172.amzn2023.x86_64
    kernel-devel-6.1.91-99.172.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 4.14.348-187.562

External links

http://alas.aws.amazon.com/AL2023/ALAS-2024-643.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds read

EUVDB-ID: #VU90273

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36916

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an out-of-bounds read error within the iocg_kick_delay() function in block/blk-iocost.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.aarch64
    perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-6.1.91-99.172.amzn2023.aarch64
    kernel-headers-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-6.1.91-99.172.amzn2023.aarch64
    perf-6.1.91-99.172.amzn2023.aarch64
    python3-perf-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.91-99.172.amzn2023.aarch64
    kernel-devel-6.1.91-99.172.amzn2023.aarch64

src:
    kernel-6.1.91-99.172.amzn2023.src

x86_64:
    bpftool-6.1.91-99.172.amzn2023.x86_64
    python3-perf-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.x86_64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.x86_64
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.x86_64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-6.1.91-99.172.amzn2023.x86_64
    perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-6.1.91-99.172.amzn2023.x86_64
    kernel-headers-6.1.91-99.172.amzn2023.x86_64
    perf-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.91-99.172.amzn2023.x86_64
    kernel-devel-6.1.91-99.172.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 4.14.348-187.562

External links

http://alas.aws.amazon.com/AL2023/ALAS-2024-643.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use of uninitialized resource

EUVDB-ID: #VU90862

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36933

CWE-ID: CWE-908 - Use of Uninitialized Resource

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to use of uninitialized resource within the EXPORT_SYMBOL_GPL() and nsh_gso_segment() functions in net/nsh/nsh.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.aarch64
    perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-6.1.91-99.172.amzn2023.aarch64
    kernel-headers-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-6.1.91-99.172.amzn2023.aarch64
    perf-6.1.91-99.172.amzn2023.aarch64
    python3-perf-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.91-99.172.amzn2023.aarch64
    kernel-devel-6.1.91-99.172.amzn2023.aarch64

src:
    kernel-6.1.91-99.172.amzn2023.src

x86_64:
    bpftool-6.1.91-99.172.amzn2023.x86_64
    python3-perf-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.x86_64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.x86_64
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.x86_64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-6.1.91-99.172.amzn2023.x86_64
    perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-6.1.91-99.172.amzn2023.x86_64
    kernel-headers-6.1.91-99.172.amzn2023.x86_64
    perf-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.91-99.172.amzn2023.x86_64
    kernel-devel-6.1.91-99.172.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 4.14.348-187.562

External links

http://alas.aws.amazon.com/AL2023/ALAS-2024-643.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Information disclosure

EUVDB-ID: #VU91321

Risk: Low

CVSSv3.1: 2.9 [AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-36959

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to information disclosure within the pinctrl_dt_to_map() function in drivers/pinctrl/devicetree.c. A local user can gain access to sensitive information.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.aarch64
    perf-debuginfo-6.1.91-99.172.amzn2023.aarch64
    bpftool-6.1.91-99.172.amzn2023.aarch64
    kernel-headers-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-6.1.91-99.172.amzn2023.aarch64
    perf-6.1.91-99.172.amzn2023.aarch64
    python3-perf-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-6.1.91-99.172.amzn2023.aarch64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-modules-extra-6.1.91-99.172.amzn2023.aarch64
    kernel-tools-devel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-6.1.91-99.172.amzn2023.aarch64
    kernel-6.1.91-99.172.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.91-99.172.amzn2023.aarch64
    kernel-devel-6.1.91-99.172.amzn2023.aarch64

src:
    kernel-6.1.91-99.172.amzn2023.src

x86_64:
    bpftool-6.1.91-99.172.amzn2023.x86_64
    python3-perf-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-livepatch-6.1.91-99.172-1.0-0.amzn2023.x86_64
    kernel-libbpf-static-6.1.91-99.172.amzn2023.x86_64
    python3-perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.91-99.172.amzn2023.x86_64
    bpftool-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-tools-devel-6.1.91-99.172.amzn2023.x86_64
    kernel-libbpf-6.1.91-99.172.amzn2023.x86_64
    perf-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-common-6.1.91-99.172.amzn2023.x86_64
    kernel-modules-extra-6.1.91-99.172.amzn2023.x86_64
    kernel-headers-6.1.91-99.172.amzn2023.x86_64
    perf-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-6.1.91-99.172.amzn2023.x86_64
    kernel-6.1.91-99.172.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.91-99.172.amzn2023.x86_64
    kernel-devel-6.1.91-99.172.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 4.14.348-187.562

External links

http://alas.aws.amazon.com/AL2023/ALAS-2024-643.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###