Amazon Linux 2 Security Advisory: ALASKERNEL-5.15-2023-016
Advisory Release Date: 2023-04-13 19:51 Pacific
Advisory Updated Date: 2024-07-03 22:01 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-07-03: CVE-2023-1611 was added to this advisory.
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. (CVE-2022-4269)
A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service. (CVE-2022-4379)
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea (CVE-2023-1611)
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. (CVE-2023-2194)
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). (CVE-2023-28466)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.15.106-64.140.amzn2.aarch64
kernel-headers-5.15.106-64.140.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.15.106-64.140.amzn2.aarch64
perf-5.15.106-64.140.amzn2.aarch64
perf-debuginfo-5.15.106-64.140.amzn2.aarch64
python-perf-5.15.106-64.140.amzn2.aarch64
python-perf-debuginfo-5.15.106-64.140.amzn2.aarch64
kernel-tools-5.15.106-64.140.amzn2.aarch64
kernel-tools-devel-5.15.106-64.140.amzn2.aarch64
kernel-tools-debuginfo-5.15.106-64.140.amzn2.aarch64
bpftool-5.15.106-64.140.amzn2.aarch64
bpftool-debuginfo-5.15.106-64.140.amzn2.aarch64
kernel-devel-5.15.106-64.140.amzn2.aarch64
kernel-debuginfo-5.15.106-64.140.amzn2.aarch64
kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.15.106-64.140.amzn2.i686
src:
kernel-5.15.106-64.140.amzn2.src
x86_64:
kernel-5.15.106-64.140.amzn2.x86_64
kernel-headers-5.15.106-64.140.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.15.106-64.140.amzn2.x86_64
perf-5.15.106-64.140.amzn2.x86_64
perf-debuginfo-5.15.106-64.140.amzn2.x86_64
python-perf-5.15.106-64.140.amzn2.x86_64
python-perf-debuginfo-5.15.106-64.140.amzn2.x86_64
kernel-tools-5.15.106-64.140.amzn2.x86_64
kernel-tools-devel-5.15.106-64.140.amzn2.x86_64
kernel-tools-debuginfo-5.15.106-64.140.amzn2.x86_64
bpftool-5.15.106-64.140.amzn2.x86_64
bpftool-debuginfo-5.15.106-64.140.amzn2.x86_64
kernel-devel-5.15.106-64.140.amzn2.x86_64
kernel-debuginfo-5.15.106-64.140.amzn2.x86_64
kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.x86_64