Amazon Linux 2023 Security Advisory: ALAS-2024-517
Advisory Release Date: 2024-02-15 02:51 Pacific
Advisory Updated Date: 2024-08-14 19:14 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-08-14: CVE-2023-52621 was added to this advisory.
2024-08-14: CVE-2023-52623 was added to this advisory.
2024-08-14: CVE-2024-26671 was added to this advisory.
2024-08-14: CVE-2023-52622 was added to this advisory.
2024-08-14: CVE-2024-26673 was added to this advisory.
2024-08-14: CVE-2024-26644 was added to this advisory.
2024-08-14: CVE-2024-26808 was added to this advisory.
2024-08-01: CVE-2024-26972 was added to this advisory.
2024-07-03: CVE-2023-52619 was added to this advisory.
2024-07-03: CVE-2024-26626 was added to this advisory.
2024-07-03: CVE-2024-26635 was added to this advisory.
2024-07-03: CVE-2023-52614 was added to this advisory.
2024-07-03: CVE-2023-52615 was added to this advisory.
2024-07-03: CVE-2024-26640 was added to this advisory.
2024-07-03: CVE-2024-26634 was added to this advisory.
2024-07-03: CVE-2024-26641 was added to this advisory.
2024-07-03: CVE-2024-26627 was added to this advisory.
2024-07-03: CVE-2023-52583 was added to this advisory.
2024-07-03: CVE-2024-26638 was added to this advisory.
2024-06-06: CVE-2023-52498 was added to this advisory.
2024-06-06: CVE-2023-52489 was added to this advisory.
2024-06-06: CVE-2024-26614 was added to this advisory.
2024-06-06: CVE-2023-52486 was added to this advisory.
2024-06-06: CVE-2023-52672 was added to this advisory.
2024-06-06: CVE-2024-26612 was added to this advisory.
2024-06-06: CVE-2023-52492 was added to this advisory.
2024-05-23: CVE-2024-26625 was added to this advisory.
2024-05-23: CVE-2024-26668 was added to this advisory.
2024-02-29: CVE-2024-1086 was added to this advisory.
In the Linux kernel, the following vulnerability has been resolved:
drm: Don't unref the same fb many times by mistake due to deadlock handling (CVE-2023-52486)
In the Linux kernel, the following vulnerability has been resolved:
mm/sparsemem: fix race in accessing memory_section->usage (CVE-2023-52489)
In the Linux kernel, the following vulnerability has been resolved:
dmaengine: fix NULL pointer in channel unregistration function (CVE-2023-52492)
In the Linux kernel, the following vulnerability has been resolved:
PM: sleep: Fix possible deadlocks in core system-wide PM code (CVE-2023-52498)
In the Linux kernel, the following vulnerability has been resolved:
ceph: fix deadlock or deadcode of misusing dget() (CVE-2023-52583)
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: Fix buffer overflow in trans_stat_show (CVE-2023-52614)
In the Linux kernel, the following vulnerability has been resolved:
hwrng: core - Fix page fault dead lock on mmap-ed hwrng (CVE-2023-52615)
In the Linux kernel, the following vulnerability has been resolved:
pstore/ram: Fix crash when setting number of cpus to an odd number (CVE-2023-52619)
In the Linux kernel, the following vulnerability has been resolved:
bpf: Check rcu_read_lock_trace_held() before calling bpf map helpers (CVE-2023-52621)
In the Linux kernel, the following vulnerability has been resolved:
ext4: avoid online resizing failures due to oversized flex bg (CVE-2023-52622)
In the Linux kernel, the following vulnerability has been resolved:
SUNRPC: Fix a suspicious RCU usage warning (CVE-2023-52623)
In the Linux kernel, the following vulnerability has been resolved:
pipe: wakeup wr_wait after setting max_usage (CVE-2023-52672)
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The nft_verdict_init() function allows positive values as drop error within the hook verdict, and hence the nf_hook_slow() function can cause a double free vulnerability when NF_DROP is issued with a drop error which resembles NF_ACCEPT.
We recommend upgrading past commit f342de4e2f33e0e39165d8639387aa6c19dff660. (CVE-2024-1086)
In rds_recv_track_latency in net/rds/af_rds.c in the Linux kernel through 6.7.1, there is an off-by-one error for an RDS_MSG_RX_DGRAM_TRACE_MAX comparison, resulting in out-of-bounds access. (CVE-2024-23849)
In the Linux kernel, the following vulnerability has been resolved:
netfs, fscache: Prevent Oops in fscache_put_cache() (CVE-2024-26612)
In the Linux kernel, the following vulnerability has been resolved:
tcp: make sure init the accept_queue's spinlocks once (CVE-2024-26614)
In the Linux kernel, the following vulnerability has been resolved:
llc: call sock_orphan() at release time (CVE-2024-26625)
In the Linux kernel, the following vulnerability has been resolved:
ipmr: fix kernel panic when forwarding mcast packets (CVE-2024-26626)
In the Linux kernel, the following vulnerability has been resolved:
scsi: core: Move scsi_host_busy() out of host lock for waking up EH handler (CVE-2024-26627)
In the Linux kernel, the following vulnerability has been resolved:
net: fix removing a namespace with conflicting altnames (CVE-2024-26634)
In the Linux kernel, the following vulnerability has been resolved:
llc: Drop support for ETH_P_TR_802_2. (CVE-2024-26635)
In the Linux kernel, the following vulnerability has been resolved:
nbd: always initialize struct msghdr completely (CVE-2024-26638)
In the Linux kernel, the following vulnerability has been resolved:
tcp: add sanity checks to rx zerocopy (CVE-2024-26640)
In the Linux kernel, the following vulnerability has been resolved:
ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (CVE-2024-26641)
In the Linux kernel, the following vulnerability has been resolved:
btrfs: don't abort filesystem when attempting to snapshot deleted subvolume (CVE-2024-26644)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_limit: reject configurations that cause integer overflow (CVE-2024-26668)
In the Linux kernel, the following vulnerability has been resolved:
blk-mq: fix IO hang from sbitmap wakeup race (CVE-2024-26671)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_ct: sanitize layer 3 and 4 protocol number in custom expectations (CVE-2024-26673)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain (CVE-2024-26808)
In the Linux kernel, the following vulnerability has been resolved:
ubifs: ubifs_symlink: Fix memleak of inode->i_link in error path (CVE-2024-26972)
Affected Packages:
kernel
Issue Correction:
Run dnf update kernel --releasever 2023.3.20240219 to update your system.
aarch64:
python3-perf-6.1.77-99.164.amzn2023.aarch64
perf-debuginfo-6.1.77-99.164.amzn2023.aarch64
kernel-tools-devel-6.1.77-99.164.amzn2023.aarch64
kernel-livepatch-6.1.77-99.164-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.77-99.164.amzn2023.aarch64
kernel-tools-debuginfo-6.1.77-99.164.amzn2023.aarch64
python3-perf-debuginfo-6.1.77-99.164.amzn2023.aarch64
kernel-libbpf-6.1.77-99.164.amzn2023.aarch64
perf-6.1.77-99.164.amzn2023.aarch64
kernel-libbpf-devel-6.1.77-99.164.amzn2023.aarch64
bpftool-6.1.77-99.164.amzn2023.aarch64
kernel-modules-extra-common-6.1.77-99.164.amzn2023.aarch64
kernel-tools-6.1.77-99.164.amzn2023.aarch64
kernel-libbpf-static-6.1.77-99.164.amzn2023.aarch64
kernel-6.1.77-99.164.amzn2023.aarch64
kernel-headers-6.1.77-99.164.amzn2023.aarch64
kernel-debuginfo-6.1.77-99.164.amzn2023.aarch64
kernel-modules-extra-6.1.77-99.164.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.77-99.164.amzn2023.aarch64
kernel-devel-6.1.77-99.164.amzn2023.aarch64
src:
kernel-6.1.77-99.164.amzn2023.src
x86_64:
kernel-tools-debuginfo-6.1.77-99.164.amzn2023.x86_64
perf-debuginfo-6.1.77-99.164.amzn2023.x86_64
perf-6.1.77-99.164.amzn2023.x86_64
kernel-modules-extra-6.1.77-99.164.amzn2023.x86_64
kernel-libbpf-static-6.1.77-99.164.amzn2023.x86_64
kernel-livepatch-6.1.77-99.164-1.0-0.amzn2023.x86_64
bpftool-6.1.77-99.164.amzn2023.x86_64
bpftool-debuginfo-6.1.77-99.164.amzn2023.x86_64
kernel-modules-extra-common-6.1.77-99.164.amzn2023.x86_64
kernel-libbpf-devel-6.1.77-99.164.amzn2023.x86_64
kernel-headers-6.1.77-99.164.amzn2023.x86_64
python3-perf-6.1.77-99.164.amzn2023.x86_64
kernel-tools-devel-6.1.77-99.164.amzn2023.x86_64
kernel-libbpf-6.1.77-99.164.amzn2023.x86_64
kernel-debuginfo-6.1.77-99.164.amzn2023.x86_64
python3-perf-debuginfo-6.1.77-99.164.amzn2023.x86_64
kernel-tools-6.1.77-99.164.amzn2023.x86_64
kernel-6.1.77-99.164.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.77-99.164.amzn2023.x86_64
kernel-devel-6.1.77-99.164.amzn2023.x86_64