Amazon Linux 2 Security Advisory: ALASKERNEL-5.15-2024-037
Advisory Release Date: 2024-02-01 20:10 Pacific
Advisory Updated Date: 2024-06-06 20:37 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-06-06: CVE-2023-0386 was added to this advisory.
2024-02-15: CVE-2022-4129 was added to this advisory.
2024-02-15: CVE-2023-3567 was added to this advisory.
2024-02-15: CVE-2023-3161 was added to this advisory.
2024-02-15: CVE-2023-1652 was added to this advisory.
A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service. (CVE-2022-4129)
A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel's OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. (CVE-2023-0386)
A memory corruption flaw was found in the Linux kernel's human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2023-1073)
A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem. (CVE-2023-1652)
In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid. (CVE-2023-26605)
A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing a font->width and font->height greater than 32 to the fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs, leading to undefined behavior and possible denial of service. (CVE-2023-3161)
A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. In this flaw an attacker with local user access may lead to a system crash or a leak of internal kernel information. (CVE-2023-3567)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.15.93-55.139.amzn2.aarch64
kernel-headers-5.15.93-55.139.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.15.93-55.139.amzn2.aarch64
perf-5.15.93-55.139.amzn2.aarch64
perf-debuginfo-5.15.93-55.139.amzn2.aarch64
python-perf-5.15.93-55.139.amzn2.aarch64
python-perf-debuginfo-5.15.93-55.139.amzn2.aarch64
kernel-tools-5.15.93-55.139.amzn2.aarch64
kernel-tools-devel-5.15.93-55.139.amzn2.aarch64
kernel-tools-debuginfo-5.15.93-55.139.amzn2.aarch64
bpftool-5.15.93-55.139.amzn2.aarch64
bpftool-debuginfo-5.15.93-55.139.amzn2.aarch64
kernel-devel-5.15.93-55.139.amzn2.aarch64
kernel-debuginfo-5.15.93-55.139.amzn2.aarch64
kernel-livepatch-5.15.93-55.139-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.15.93-55.139.amzn2.i686
src:
kernel-5.15.93-55.139.amzn2.src
x86_64:
kernel-5.15.93-55.139.amzn2.x86_64
kernel-headers-5.15.93-55.139.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.15.93-55.139.amzn2.x86_64
perf-5.15.93-55.139.amzn2.x86_64
perf-debuginfo-5.15.93-55.139.amzn2.x86_64
python-perf-5.15.93-55.139.amzn2.x86_64
python-perf-debuginfo-5.15.93-55.139.amzn2.x86_64
kernel-tools-5.15.93-55.139.amzn2.x86_64
kernel-tools-devel-5.15.93-55.139.amzn2.x86_64
kernel-tools-debuginfo-5.15.93-55.139.amzn2.x86_64
bpftool-5.15.93-55.139.amzn2.x86_64
bpftool-debuginfo-5.15.93-55.139.amzn2.x86_64
kernel-devel-5.15.93-55.139.amzn2.x86_64
kernel-debuginfo-5.15.93-55.139.amzn2.x86_64
kernel-livepatch-5.15.93-55.139-1.0-0.amzn2.x86_64