Amazon Linux AMI update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2022-27672
CVE-2023-1078
CVE-2023-3161
CVE-2023-3359
CVE-2023-3567
CVE-2023-52746
CWE-ID CWE-1342
CWE-787
CWE-682
CWE-476
CWE-416
CWE-401
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

kernel
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Cross-thread return address predictions

EUVDB-ID: #VU72470

Risk: Low

CVSSv3.1: 2.2 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-27672

CWE-ID: CWE-1342 - Information Exposure through Microarchitectural State after Transient Execution

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to certain AMD processors may speculatively execute instructions at an incorrect return site after an SMT mode switch that may potentially lead to information disclosure.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.aarch64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    perf-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.aarch64
    kernel-headers-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-6.1.12-17.42.amzn2023.aarch64
    bpftool-6.1.12-17.42.amzn2023.aarch64
    perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.12-17.42.amzn2023.aarch64
    kernel-devel-6.1.12-17.42.amzn2023.aarch64

src:
    kernel-6.1.12-17.42.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.x86_64
    bpftool-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.x86_64
    python3-perf-6.1.12-17.42.amzn2023.x86_64
    perf-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.x86_64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.x86_64
    perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-headers-6.1.12-17.42.amzn2023.x86_64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.12-17.42.amzn2023.x86_64
    kernel-devel-6.1.12-17.42.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.12-17.42

CPE2.3 External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-132.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Out-of-bounds write

EUVDB-ID: #VU74054

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1078

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the rds_rm_zerocopy_callback() function in Linux kernel RDS (Reliable Datagram Sockets) protocol. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.aarch64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    perf-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.aarch64
    kernel-headers-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-6.1.12-17.42.amzn2023.aarch64
    bpftool-6.1.12-17.42.amzn2023.aarch64
    perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.12-17.42.amzn2023.aarch64
    kernel-devel-6.1.12-17.42.amzn2023.aarch64

src:
    kernel-6.1.12-17.42.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.x86_64
    bpftool-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.x86_64
    python3-perf-6.1.12-17.42.amzn2023.x86_64
    perf-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.x86_64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.x86_64
    perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-headers-6.1.12-17.42.amzn2023.x86_64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.12-17.42.amzn2023.x86_64
    kernel-devel-6.1.12-17.42.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.12-17.42

CPE2.3 External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-132.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Incorrect calculation

EUVDB-ID: #VU77956

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-3161

CWE-ID: CWE-682 - Incorrect Calculation

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to incorrect calculation in the Framebuffer Console (fbcon) in the Linux kernel. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.aarch64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    perf-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.aarch64
    kernel-headers-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-6.1.12-17.42.amzn2023.aarch64
    bpftool-6.1.12-17.42.amzn2023.aarch64
    perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.12-17.42.amzn2023.aarch64
    kernel-devel-6.1.12-17.42.amzn2023.aarch64

src:
    kernel-6.1.12-17.42.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.x86_64
    bpftool-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.x86_64
    python3-perf-6.1.12-17.42.amzn2023.x86_64
    perf-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.x86_64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.x86_64
    perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-headers-6.1.12-17.42.amzn2023.x86_64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.12-17.42.amzn2023.x86_64
    kernel-devel-6.1.12-17.42.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.12-17.42

CPE2.3 External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-132.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) NULL pointer dereference

EUVDB-ID: #VU78785

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-3359

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the brcm_nvram_parse() function in drivers/nvmem/brcm_nvram.c. A local user can pass specially crafted data to the system and perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.aarch64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    perf-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.aarch64
    kernel-headers-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-6.1.12-17.42.amzn2023.aarch64
    bpftool-6.1.12-17.42.amzn2023.aarch64
    perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.12-17.42.amzn2023.aarch64
    kernel-devel-6.1.12-17.42.amzn2023.aarch64

src:
    kernel-6.1.12-17.42.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.x86_64
    bpftool-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.x86_64
    python3-perf-6.1.12-17.42.amzn2023.x86_64
    perf-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.x86_64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.x86_64
    perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-headers-6.1.12-17.42.amzn2023.x86_64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.12-17.42.amzn2023.x86_64
    kernel-devel-6.1.12-17.42.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.12-17.42

CPE2.3 External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-132.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU79491

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-3567

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the vc_screen() function in vcs_read in drivers/tty/vt/vc_screen.c. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.aarch64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    perf-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.aarch64
    kernel-headers-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-6.1.12-17.42.amzn2023.aarch64
    bpftool-6.1.12-17.42.amzn2023.aarch64
    perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.12-17.42.amzn2023.aarch64
    kernel-devel-6.1.12-17.42.amzn2023.aarch64

src:
    kernel-6.1.12-17.42.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.x86_64
    bpftool-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.x86_64
    python3-perf-6.1.12-17.42.amzn2023.x86_64
    perf-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.x86_64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.x86_64
    perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-headers-6.1.12-17.42.amzn2023.x86_64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.12-17.42.amzn2023.x86_64
    kernel-devel-6.1.12-17.42.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.12-17.42

CPE2.3 External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-132.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Memory leak

EUVDB-ID: #VU91620

Risk: Low

CVSSv3.1: 4.8 [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-52746

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to memory leak within the xfrm_xlate32_attr() function in net/xfrm/xfrm_compat.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.aarch64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    perf-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.aarch64
    kernel-headers-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-6.1.12-17.42.amzn2023.aarch64
    kernel-libbpf-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-tools-devel-6.1.12-17.42.amzn2023.aarch64
    python3-perf-6.1.12-17.42.amzn2023.aarch64
    bpftool-6.1.12-17.42.amzn2023.aarch64
    perf-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-6.1.12-17.42.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.12-17.42.amzn2023.aarch64
    kernel-devel-6.1.12-17.42.amzn2023.aarch64

src:
    kernel-6.1.12-17.42.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.12-17.42.amzn2023.x86_64
    bpftool-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.12-17.42.amzn2023.x86_64
    python3-perf-6.1.12-17.42.amzn2023.x86_64
    perf-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-static-6.1.12-17.42.amzn2023.x86_64
    kernel-livepatch-6.1.12-17.42-1.0-0.amzn2023.x86_64
    perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-headers-6.1.12-17.42.amzn2023.x86_64
    python3-perf-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-6.1.12-17.42.amzn2023.x86_64
    kernel-libbpf-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-tools-devel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-6.1.12-17.42.amzn2023.x86_64
    kernel-6.1.12-17.42.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.12-17.42.amzn2023.x86_64
    kernel-devel-6.1.12-17.42.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.12-17.42

CPE2.3 External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-132.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###