FERRAMENTAS LINUX: Critical Linux Kernel Vulnerabilities Patched for AWS Systems (CVE-2024-8805, CVE-2025-2312)

quarta-feira, 25 de junho de 2025

Critical Linux Kernel Vulnerabilities Patched for AWS Systems (CVE-2024-8805, CVE-2025-2312)

 

Ubuntu


Urgent Linux kernel security update for AWS users fixes critical Bluetooth and CIFS vulnerabilities (CVE-2024-8805, CVE-2025-2312). Learn how to patch, mitigate risks, and protect cloud infrastructure from zero-day exploits.

Published: June 24, 2025 | Last Updated: June 24, 2025

Overview: High-Risk Linux Kernel Flaws in AWS Environments

The Linux kernel for Amazon Web Services (AWS) has been updated to address multiple critical security vulnerabilities, including:

  • CVE-2024-8805: Bluetooth driver flaw allowing rogue device pairing and arbitrary code execution.

  • CVE-2025-2312: CIFS namespace misconfiguration exposing sensitive data.

These exploits could enable privilege escalationdata breaches, or cloud infrastructure hijacking. Enterprises using Ubuntu Pro or custom kernels must act immediately.


Detailed Vulnerability Analysis

1. Bluetooth Driver Exploit (CVE-2024-8805)

Discovered by Michael Randrianantenaina, this flaw in the Linux kernel’s Bluetooth stack permits:

  • Unauthorized device pairing within physical proximity.

  • Remote code execution (RCE) via malformed L2CAP packets.
    Affected Systems: AWS instances with Bluetooth modules (e.g., IoT edge devices).

2. CIFS Namespace Bypass (CVE-2025-2312)

A misconfigured upcall mechanism in the CIFS filesystem allows:

  • Cross-tenant data leaks in multi-tenant cloud environments.

  • Credential theft via intercepted SMB traffic.

Additional Patched Subsystems

  • PowerPC/x86 architecture (Spectre v4 mitigations).

  • ACPI/GPU drivers (DMA attack vectors).

  • InfiniBand (RDMA side-channel leaks).


Patch Instructions for Ubuntu AWS Kernels

Step-by-Step Update Guide

  1. Run standard update:

    bash
    sudo apt update && sudo apt upgrade -y  
  2. Reboot required:

    bash
    sudo reboot  
  3. Recompile third-party modules (if applicable):

    bash
    sudo dpkg-reconfigure linux-image-$(uname -r)  

Affected Package Versions

Ubuntu ReleasePackage Version
22.04 (Jammy)linux-image-5.15.0-1086-aws
20.04 (Focal)linux-image-5.15.0-1086-aws-64k

⚠️ Warning: ABI changes necessitate manual recompilation of DKMS modules (e.g., NVIDIA drivers, ZFS).


Mitigation Strategies for Unpatched Systems

  • Disable Bluetooth (if unused):

    bash
    sudo systemctl disable bluetooth  
  • Restrict CIFS mounts via nosharesock in /etc/fstab.

  • Deploy Ubuntu Pro for extended 10-year security coverage on 25,000+ packages.


Why This Matters for Cloud Security

  • AWS workloads are prime targets for kernel-level exploits.

  • Containerized environments (e.g., Kubernetes) are vulnerable to breakout attacks.

  • Compliance impact: Unpatched systems fail CIS Benchmark 8.2.1.

Pro Tip: Use AWS Systems Manager Patch Manager to automate updates across EC2 fleets.


FAQ: Linux Kernel Security Updates

Q: How urgent is this update?

A: Critical. CVE-2024-8805 is exploitable over-the-air (OTA).*

Q: Does Ubuntu Pro cover these fixes?

A: Yes, including legacy LTS kernels.

Q: Can I roll back after patching?

A: Not recommended—ABI changes are irreversible.



Nenhum comentário:

Postar um comentário