ALAS2023-2023-228


Amazon Linux 2023 Security Advisory: ALAS-2023-228
Advisory Release Date: 2023-06-21 19:11 Pacific
Advisory Updated Date: 2023-09-27 21:04 Pacific
Severity: Important

Issue Overview:

2023-09-27: CVE-2023-3567 was added to this advisory.

A flaw was found in the Linux kernel's networking subsystem within the RPL protocol's handling. This issue results from the improper handling of user-supplied data, which can lead to an assertion failure. This flaw allows an unauthenticated, remote attacker to create a denial of service condition on the system. (CVE-2023-2156)

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.

The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.


We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e. (CVE-2023-3090)

A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. In this flaw an attacker with local user access may lead to a system crash or a leak of internal kernel information. (CVE-2023-3567)

An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation. (CVE-2023-35788)


Affected Packages:

kernel


Issue Correction:
Run dnf update kernel --releasever 2023.1.20230628 to update your system.

New Packages:
aarch64:
    kernel-libbpf-static-6.1.34-56.100.amzn2023.aarch64
    bpftool-6.1.34-56.100.amzn2023.aarch64
    python3-perf-debuginfo-6.1.34-56.100.amzn2023.aarch64
    kernel-tools-6.1.34-56.100.amzn2023.aarch64
    bpftool-debuginfo-6.1.34-56.100.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.34-56.100.amzn2023.aarch64
    kernel-headers-6.1.34-56.100.amzn2023.aarch64
    kernel-libbpf-6.1.34-56.100.amzn2023.aarch64
    kernel-livepatch-6.1.34-56.100-1.0-0.amzn2023.aarch64
    python3-perf-6.1.34-56.100.amzn2023.aarch64
    kernel-tools-devel-6.1.34-56.100.amzn2023.aarch64
    perf-debuginfo-6.1.34-56.100.amzn2023.aarch64
    perf-6.1.34-56.100.amzn2023.aarch64
    kernel-libbpf-devel-6.1.34-56.100.amzn2023.aarch64
    kernel-debuginfo-6.1.34-56.100.amzn2023.aarch64
    kernel-6.1.34-56.100.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.34-56.100.amzn2023.aarch64
    kernel-devel-6.1.34-56.100.amzn2023.aarch64

src:
    kernel-6.1.34-56.100.amzn2023.src

x86_64:
    kernel-livepatch-6.1.34-56.100-1.0-0.amzn2023.x86_64
    kernel-tools-devel-6.1.34-56.100.amzn2023.x86_64
    kernel-libbpf-6.1.34-56.100.amzn2023.x86_64
    python3-perf-6.1.34-56.100.amzn2023.x86_64
    bpftool-6.1.34-56.100.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.34-56.100.amzn2023.x86_64
    kernel-libbpf-static-6.1.34-56.100.amzn2023.x86_64
    python3-perf-debuginfo-6.1.34-56.100.amzn2023.x86_64
    bpftool-debuginfo-6.1.34-56.100.amzn2023.x86_64
    perf-6.1.34-56.100.amzn2023.x86_64
    kernel-libbpf-devel-6.1.34-56.100.amzn2023.x86_64
    kernel-tools-6.1.34-56.100.amzn2023.x86_64
    perf-debuginfo-6.1.34-56.100.amzn2023.x86_64
    kernel-headers-6.1.34-56.100.amzn2023.x86_64
    kernel-debuginfo-6.1.34-56.100.amzn2023.x86_64
    kernel-6.1.34-56.100.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.34-56.100.amzn2023.x86_64
    kernel-devel-6.1.34-56.100.amzn2023.x86_64