Amazon Linux 2023 Security Advisory: ALASLIVEPATCH-2023-016
Advisory Release Date: 2023-09-15 20:55 Pacific
Advisory Updated Date: 2023-09-15 20:55 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in the Linux kernel's networking subsystem within the RPL protocol's handling. This issue results from the improper handling of user-supplied data, which can lead to an assertion failure. This flaw allows an unauthenticated, remote attacker to create a denial of service condition on the system. (CVE-2023-2156)
A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.
The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.
We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e. (CVE-2023-3090)
An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation. (CVE-2023-35788)
Affected Packages:
kernel-livepatch-6.1.27-43.48
Issue Correction:
Run yum update kernel-livepatch-6.1.27-43.48 to update your system.
src:
kernel-livepatch-6.1.27-43.48-1.0-2.amzn2023.src
x86_64:
kernel-livepatch-6.1.27-43.48-1.0-2.amzn2023.x86_64