Amazon Linux 2023 Security Advisory: ALAS-2023-138
Advisory Release Date: 2023-03-20 18:27 Pacific
Advisory Updated Date: 2024-01-19 01:31 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-01-19: CVE-2023-7192 was added to this advisory.
2023-10-25: CVE-2023-45863 was added to this advisory.
2023-10-10: CVE-2023-1076 was added to this advisory.
A double-free vulnerability was found in the handling of IORING_OP_SOCKET operation with io_uring on the Linux kernel. (CVE-2023-1032)
Due to a type confusion during initializations, the tun and tap sockets in the Linux Kernel have their socket UID hardcoded to 0, i.e. root. While it will be often correct, as TUN/TAP devices require CAP_NET_ADMIN, it may not always be the case. The socket UID may be used for network filtering and routing, thus TUN/TAP sockets may be incorrectly managed, potentially bypassing network filters based on UID. (CVE-2023-1076)
kernel: Type confusion in pick_next_rt_entity(), which can result in memory corruption. (CVE-2023-1077)
A flaw use after free in the Linux kernel integrated infrared receiver/transceiver driver was found in the way user detaching rc device. A local user could use this flaw to crash the system or potentially escalate their privileges on the system. (CVE-2023-1118)
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. (CVE-2023-1829)
When plain IBRS is enabled (not enhanced IBRS), the logic in spectre_v2_user_select_mitigation() determines that STIBP is not needed. The IBRS bit implicitly protects against cross-thread branch target
injection. However, with legacy IBRS, the IBRS bit is cleared on returning to userspace for performance reasons which leaves userspace threads vulnerable to cross-thread branch target injection against which STIBP protects. (CVE-2023-1998)
A use-after-free flaw was found in hfsplus_put_super in fs/hfsplus/super.c in the Linux Kernel. This flaw could allow a local user to cause a denial of service. (CVE-2023-2985)
An issue was discovered in lib/kobject.c in the Linux kernel before 6.2.3. With root access, an attacker can trigger a race condition that results in a fill_kobj_path out-of-bounds write. (CVE-2023-45863)
kernel: refcount leak in ctnetlink_create_conntrack() (CVE-2023-7192)
Affected Packages:
kernel
Issue Correction:
Run dnf update --releasever=2023.0.20230322 kernel to update your system.
aarch64:
kernel-libbpf-6.1.19-30.43.amzn2023.aarch64
bpftool-6.1.19-30.43.amzn2023.aarch64
kernel-libbpf-static-6.1.19-30.43.amzn2023.aarch64
python3-perf-debuginfo-6.1.19-30.43.amzn2023.aarch64
kernel-tools-6.1.19-30.43.amzn2023.aarch64
kernel-libbpf-devel-6.1.19-30.43.amzn2023.aarch64
perf-debuginfo-6.1.19-30.43.amzn2023.aarch64
python3-perf-6.1.19-30.43.amzn2023.aarch64
kernel-headers-6.1.19-30.43.amzn2023.aarch64
kernel-livepatch-6.1.19-30.43-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.19-30.43.amzn2023.aarch64
kernel-tools-devel-6.1.19-30.43.amzn2023.aarch64
perf-6.1.19-30.43.amzn2023.aarch64
kernel-tools-debuginfo-6.1.19-30.43.amzn2023.aarch64
kernel-debuginfo-6.1.19-30.43.amzn2023.aarch64
kernel-6.1.19-30.43.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.19-30.43.amzn2023.aarch64
kernel-devel-6.1.19-30.43.amzn2023.aarch64
src:
kernel-6.1.19-30.43.amzn2023.src
x86_64:
kernel-tools-devel-6.1.19-30.43.amzn2023.x86_64
kernel-libbpf-6.1.19-30.43.amzn2023.x86_64
kernel-libbpf-devel-6.1.19-30.43.amzn2023.x86_64
bpftool-debuginfo-6.1.19-30.43.amzn2023.x86_64
kernel-livepatch-6.1.19-30.43-1.0-0.amzn2023.x86_64
python3-perf-debuginfo-6.1.19-30.43.amzn2023.x86_64
kernel-headers-6.1.19-30.43.amzn2023.x86_64
kernel-libbpf-static-6.1.19-30.43.amzn2023.x86_64
bpftool-6.1.19-30.43.amzn2023.x86_64
perf-6.1.19-30.43.amzn2023.x86_64
python3-perf-6.1.19-30.43.amzn2023.x86_64
kernel-tools-debuginfo-6.1.19-30.43.amzn2023.x86_64
perf-debuginfo-6.1.19-30.43.amzn2023.x86_64
kernel-debuginfo-6.1.19-30.43.amzn2023.x86_64
kernel-tools-6.1.19-30.43.amzn2023.x86_64
kernel-6.1.19-30.43.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.19-30.43.amzn2023.x86_64
kernel-devel-6.1.19-30.43.amzn2023.x86_64