Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.15-2023-017
Advisory Released Date: 2023-05-01
Advisory Updated Date: 2026-02-08
FAQs regarding Amazon Linux ALAS/CVE Severity
An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2023-2124)
In the Linux kernel, the following vulnerability has been resolved:
skbuff: Fix a race between coalescing and releasing SKBs (CVE-2023-53186)
In the Linux kernel, the following vulnerability has been resolved:
Drivers: vmbus: Check for channel allocation before looking up relids (CVE-2023-53273)
In the Linux kernel, the following vulnerability has been resolved:
sctp: check send stream number after wait_for_sndbuf (CVE-2023-53296)
In the Linux kernel, the following vulnerability has been resolved:
sctp: fix a potential overflow in sctp_ifwdtsn_skip (CVE-2023-53372)
In the Linux kernel, the following vulnerability has been resolved:
tracing: Free error logs of tracing instances (CVE-2023-53375)
In the Linux kernel, the following vulnerability has been resolved:
RDMA/cma: Allow UD qp_type to join multicast only (CVE-2023-53525)
In the Linux kernel, the following vulnerability has been resolved:
mm/swap: fix swap_info_struct race between swapoff and get_swap_pages() (CVE-2023-53623)
In the Linux kernel, the following vulnerability has been resolved:
NFSD: Avoid calling OPDESC() with ops->opnum == OP_ILLEGAL (CVE-2023-53680)
In the Linux kernel, the following vulnerability has been resolved:
RDMA/core: Fix GID entry ref leak when create_ah fails (CVE-2023-54003)
In the Linux kernel, the following vulnerability has been resolved:
fs: drop peer group ids under namespace lock (CVE-2023-54128)
In the Linux kernel, the following vulnerability has been resolved:
mptcp: stricter state check in mptcp_worker (CVE-2023-54176)
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: fix race condition UAF in i915_perf_add_config_ioctl (CVE-2023-54202)
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix an uninit variable access bug in __ip6_make_skb() (CVE-2023-54265)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel or yum update --advisory ALAS2KERNEL-5.15-2023-017 to update your system.
aarch64:
kernel-5.15.108-65.141.amzn2.aarch64
kernel-headers-5.15.108-65.141.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.15.108-65.141.amzn2.aarch64
perf-5.15.108-65.141.amzn2.aarch64
perf-debuginfo-5.15.108-65.141.amzn2.aarch64
python-perf-5.15.108-65.141.amzn2.aarch64
python-perf-debuginfo-5.15.108-65.141.amzn2.aarch64
kernel-tools-5.15.108-65.141.amzn2.aarch64
kernel-tools-devel-5.15.108-65.141.amzn2.aarch64
kernel-tools-debuginfo-5.15.108-65.141.amzn2.aarch64
bpftool-5.15.108-65.141.amzn2.aarch64
bpftool-debuginfo-5.15.108-65.141.amzn2.aarch64
kernel-devel-5.15.108-65.141.amzn2.aarch64
kernel-debuginfo-5.15.108-65.141.amzn2.aarch64
kernel-livepatch-5.15.108-65.141-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.15.108-65.141.amzn2.i686
src:
kernel-5.15.108-65.141.amzn2.src
x86_64:
kernel-5.15.108-65.141.amzn2.x86_64
kernel-headers-5.15.108-65.141.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.15.108-65.141.amzn2.x86_64
perf-5.15.108-65.141.amzn2.x86_64
perf-debuginfo-5.15.108-65.141.amzn2.x86_64
python-perf-5.15.108-65.141.amzn2.x86_64
python-perf-debuginfo-5.15.108-65.141.amzn2.x86_64
kernel-tools-5.15.108-65.141.amzn2.x86_64
kernel-tools-devel-5.15.108-65.141.amzn2.x86_64
kernel-tools-debuginfo-5.15.108-65.141.amzn2.x86_64
bpftool-5.15.108-65.141.amzn2.x86_64
bpftool-debuginfo-5.15.108-65.141.amzn2.x86_64
kernel-devel-5.15.108-65.141.amzn2.x86_64
kernel-debuginfo-5.15.108-65.141.amzn2.x86_64
kernel-livepatch-5.15.108-65.141-1.0-0.amzn2.x86_64
2026-02-08: CVE-2023-54265 was added to this advisory.
2026-02-08: CVE-2023-54176 was added to this advisory.
2026-02-08: CVE-2023-54003 was added to this advisory.
2026-02-08: CVE-2023-54202 was added to this advisory.
2026-02-08: CVE-2023-54128 was added to this advisory.
2025-10-18: CVE-2023-53623 was added to this advisory.
2025-10-18: CVE-2023-53680 was added to this advisory.
2025-10-08: CVE-2023-53525 was added to this advisory.
2025-10-02: CVE-2023-53372 was added to this advisory.
2025-10-02: CVE-2023-53375 was added to this advisory.
2025-09-22: CVE-2023-53186 was added to this advisory.
2025-09-22: CVE-2023-53273 was added to this advisory.
2025-09-22: CVE-2023-53296 was added to this advisory.