Amazon Linux 2023 Security Advisory: ALAS-2023-127
Advisory Release Date: 2023-03-11 01:10 Pacific
Advisory Updated Date: 2024-12-05 20:34 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-12-05: CVE-2023-52702 was added to this advisory.
2024-12-05: CVE-2023-52704 was added to this advisory.
2024-12-05: CVE-2023-52737 was added to this advisory.
2024-11-13: CVE-2023-52735 was added to this advisory.
2024-08-01: CVE-2023-52646 was added to this advisory.
2024-06-19: CVE-2023-52707 was added to this advisory.
2023-07-05: CVE-2023-1281 was added to this advisory.
A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks. L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a (CVE-2022-2196)
Detected a few exploitable gadgets that could leak secret memory through a side-channel such as MDS as well as insufficient hardening of the usercopy functions against spectre-v1. (CVE-2023-0458)
Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.
This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. (CVE-2023-1281)
In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device. (CVE-2023-26545)
In the Linux kernel, the following vulnerability has been resolved:
aio: fix mremap after fork null-deref (CVE-2023-52646)
In the Linux kernel, the following vulnerability has been resolved:
net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (CVE-2023-52702)
In the Linux kernel, the following vulnerability has been resolved:
freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL (CVE-2023-52704)
In the Linux kernel, the following vulnerability has been resolved:
sched/psi: Fix use-after-free in ep_remove_wait_queue() (CVE-2023-52707)
In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (CVE-2023-52735)
In the Linux kernel, the following vulnerability has been resolved:
btrfs: lock the inode in shared mode before starting fiemap (CVE-2023-52737)
Affected Packages:
kernel
Issue Correction:
Run dnf update kernel --releasever=2023.0.20230315 to update your system.
aarch64:
perf-debuginfo-6.1.15-28.43.amzn2023.aarch64
kernel-tools-debuginfo-6.1.15-28.43.amzn2023.aarch64
bpftool-debuginfo-6.1.15-28.43.amzn2023.aarch64
kernel-tools-6.1.15-28.43.amzn2023.aarch64
python3-perf-debuginfo-6.1.15-28.43.amzn2023.aarch64
kernel-livepatch-6.1.15-28.43-1.0-0.amzn2023.aarch64
python3-perf-6.1.15-28.43.amzn2023.aarch64
kernel-tools-devel-6.1.15-28.43.amzn2023.aarch64
kernel-libbpf-6.1.15-28.43.amzn2023.aarch64
kernel-libbpf-static-6.1.15-28.43.amzn2023.aarch64
kernel-libbpf-devel-6.1.15-28.43.amzn2023.aarch64
bpftool-6.1.15-28.43.amzn2023.aarch64
perf-6.1.15-28.43.amzn2023.aarch64
kernel-headers-6.1.15-28.43.amzn2023.aarch64
kernel-debuginfo-6.1.15-28.43.amzn2023.aarch64
kernel-6.1.15-28.43.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.15-28.43.amzn2023.aarch64
kernel-devel-6.1.15-28.43.amzn2023.aarch64
src:
kernel-6.1.15-28.43.amzn2023.src
x86_64:
python3-perf-6.1.15-28.43.amzn2023.x86_64
bpftool-6.1.15-28.43.amzn2023.x86_64
kernel-libbpf-devel-6.1.15-28.43.amzn2023.x86_64
kernel-tools-debuginfo-6.1.15-28.43.amzn2023.x86_64
bpftool-debuginfo-6.1.15-28.43.amzn2023.x86_64
kernel-livepatch-6.1.15-28.43-1.0-0.amzn2023.x86_64
kernel-libbpf-6.1.15-28.43.amzn2023.x86_64
python3-perf-debuginfo-6.1.15-28.43.amzn2023.x86_64
perf-6.1.15-28.43.amzn2023.x86_64
kernel-tools-6.1.15-28.43.amzn2023.x86_64
kernel-libbpf-static-6.1.15-28.43.amzn2023.x86_64
perf-debuginfo-6.1.15-28.43.amzn2023.x86_64
kernel-tools-devel-6.1.15-28.43.amzn2023.x86_64
kernel-headers-6.1.15-28.43.amzn2023.x86_64
kernel-debuginfo-6.1.15-28.43.amzn2023.x86_64
kernel-6.1.15-28.43.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.15-28.43.amzn2023.x86_64
kernel-devel-6.1.15-28.43.amzn2023.x86_64