vulnerability
Amazon Linux AMI 2: CVE-2024-24790: Security patch for amazon-ecr-credential-helper, amazon-ssm-agent, containerd, docker, golang, nerdctl, runc (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
10 | (AV:N/AC:L/Au:N/C:C/I:C/A:C) | 06/05/2024 | 06/26/2024 | 01/28/2025 |
Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
06/05/2024
Added
06/26/2024
Modified
01/28/2025
Description
The various Is methods (IsPrivate, IsLoopback, etc) did not work as expected for IPv4-mapped IPv6 addresses, returning false for addresses which would return true in their traditional IPv4 forms.
Solution(s)
amazon-linux-ami-2-upgrade-amazon-ecr-credential-helperamazon-linux-ami-2-upgrade-amazon-ecr-credential-helper-debuginfoamazon-linux-ami-2-upgrade-amazon-ssm-agentamazon-linux-ami-2-upgrade-containerdamazon-linux-ami-2-upgrade-containerd-debuginfoamazon-linux-ami-2-upgrade-containerd-stressamazon-linux-ami-2-upgrade-dockeramazon-linux-ami-2-upgrade-docker-debuginfoamazon-linux-ami-2-upgrade-golangamazon-linux-ami-2-upgrade-golang-binamazon-linux-ami-2-upgrade-golang-docsamazon-linux-ami-2-upgrade-golang-miscamazon-linux-ami-2-upgrade-golang-sharedamazon-linux-ami-2-upgrade-golang-srcamazon-linux-ami-2-upgrade-golang-testsamazon-linux-ami-2-upgrade-nerdctlamazon-linux-ami-2-upgrade-nerdctl-debuginfoamazon-linux-ami-2-upgrade-runcamazon-linux-ami-2-upgrade-runc-debuginfo
References
- AMAZON-AL2/ALAS-2024-2576
- AMAZON-AL2/ALAS-2024-2618
- AMAZON-AL2/ALAS-2024-2645
- AMAZON-AL2/ALASDOCKER-2024-041
- AMAZON-AL2/ALASDOCKER-2024-043
- AMAZON-AL2/ALASDOCKER-2024-045
- AMAZON-AL2/ALASDOCKER-2024-046
- AMAZON-AL2/ALASECS-2024-040
- AMAZON-AL2/ALASECS-2024-042
- AMAZON-AL2/ALASECS-2024-043
- AMAZON-AL2/ALASNITRO-ENCLAVES-2024-042
- AMAZON-AL2/ALASNITRO-ENCLAVES-2024-044
- AMAZON-AL2/ALASNITRO-ENCLAVES-2024-046
- AMAZON-AL2/ALASNITRO-ENCLAVES-2024-047
- CVE-2024-24790
- https://attackerkb.com/topics/CVE-2024-24790

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.