vulnerability

Amazon Linux AMI 2: CVE-2024-26900: Security patch for kernel (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
04/17/2024
Added
06/12/2024
Modified
01/30/2025

Description

In the Linux kernel, the following vulnerability has been resolved:

md: fix kmemleak of rdev->serial

If kobject_add() is fail in bind_rdev_to_array(), 'rdev->serial' will be
alloc not be freed, and kmemleak occurs.

unreferenced object 0xffff88815a350000 (size 49152):
comm "mdadm", pid 789, jiffies 4294716910
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace (crc f773277a):
[] kmemleak_alloc+0x61/0xe0
[] __kmalloc_large_node+0x15e/0x270
[] __kmalloc_node.cold+0x11/0x7f
[] kvmalloc_node+0x74/0x150
[] rdev_init_serial+0x67/0x170
[] mddev_create_serial_pool+0x62/0x220
[] bind_rdev_to_array+0x2af/0x630
[] md_add_new_disk+0x400/0x9f0
[] md_ioctl+0x15bf/0x1c10
[] blkdev_ioctl+0x191/0x3f0
[] vfs_ioctl+0x22/0x60
[] __x64_sys_ioctl+0xba/0xe0
[] do_syscall_64+0x71/0x150
[] entry_SYSCALL_64_after_hwframe+0x6c/0x74

Solution(s)

amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-217-205-860amazon-linux-ami-2-upgrade-kernel-livepatch-5-15-160-104-158amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.