ALASKERNEL-5.15-2023-016


Amazon Linux 2 Security Advisory: ALASKERNEL-5.15-2023-016
Advisory Release Date: 2023-04-13 19:51 Pacific
Advisory Updated Date: 2024-07-03 22:01 Pacific
Severity: Important

Issue Overview:

2024-07-03: CVE-2023-1611 was added to this advisory.

A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. (CVE-2022-4269)

A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service. (CVE-2022-4379)

A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea (CVE-2023-1611)

An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. (CVE-2023-2194)

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). (CVE-2023-28466)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.15.106-64.140.amzn2.aarch64
    kernel-headers-5.15.106-64.140.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.15.106-64.140.amzn2.aarch64
    perf-5.15.106-64.140.amzn2.aarch64
    perf-debuginfo-5.15.106-64.140.amzn2.aarch64
    python-perf-5.15.106-64.140.amzn2.aarch64
    python-perf-debuginfo-5.15.106-64.140.amzn2.aarch64
    kernel-tools-5.15.106-64.140.amzn2.aarch64
    kernel-tools-devel-5.15.106-64.140.amzn2.aarch64
    kernel-tools-debuginfo-5.15.106-64.140.amzn2.aarch64
    bpftool-5.15.106-64.140.amzn2.aarch64
    bpftool-debuginfo-5.15.106-64.140.amzn2.aarch64
    kernel-devel-5.15.106-64.140.amzn2.aarch64
    kernel-debuginfo-5.15.106-64.140.amzn2.aarch64
    kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.15.106-64.140.amzn2.i686

src:
    kernel-5.15.106-64.140.amzn2.src

x86_64:
    kernel-5.15.106-64.140.amzn2.x86_64
    kernel-headers-5.15.106-64.140.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.15.106-64.140.amzn2.x86_64
    perf-5.15.106-64.140.amzn2.x86_64
    perf-debuginfo-5.15.106-64.140.amzn2.x86_64
    python-perf-5.15.106-64.140.amzn2.x86_64
    python-perf-debuginfo-5.15.106-64.140.amzn2.x86_64
    kernel-tools-5.15.106-64.140.amzn2.x86_64
    kernel-tools-devel-5.15.106-64.140.amzn2.x86_64
    kernel-tools-debuginfo-5.15.106-64.140.amzn2.x86_64
    bpftool-5.15.106-64.140.amzn2.x86_64
    bpftool-debuginfo-5.15.106-64.140.amzn2.x86_64
    kernel-devel-5.15.106-64.140.amzn2.x86_64
    kernel-debuginfo-5.15.106-64.140.amzn2.x86_64
    kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.x86_64