Amazon Linux AMI update for kernel



Published: 2024-08-06
Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2022-4269
CVE-2023-1583
CVE-2023-1611
CVE-2023-2194
CWE-ID CWE-833
CWE-476
CWE-416
CWE-787
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Amazon Linux AMI
Operating systems & Components / Operating system

kernel
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Deadlock

EUVDB-ID: #VU73186

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-4269

CWE-ID: CWE-833 - Deadlock

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to an error in the Linux kernel Traffic Control (TC) subsystem. A local user can use a specific network configuration (redirecting egress packets to ingress using TC action "mirred") to trigger a CPU soft lockup.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.aarch64
    python3-perf-6.1.23-36.46.amzn2023.aarch64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.aarch64
    bpftool-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-6.1.23-36.46.amzn2023.aarch64
    bpftool-6.1.23-36.46.amzn2023.aarch64
    perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-devel-6.1.23-36.46.amzn2023.aarch64
    perf-6.1.23-36.46.amzn2023.aarch64
    kernel-headers-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.23-36.46.amzn2023.aarch64
    kernel-devel-6.1.23-36.46.amzn2023.aarch64

src:
    kernel-6.1.23-36.46.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.x86_64
    bpftool-6.1.23-36.46.amzn2023.x86_64
    perf-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-6.1.23-36.46.amzn2023.x86_64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.x86_64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-devel-6.1.23-36.46.amzn2023.x86_64
    perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-headers-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.23-36.46.amzn2023.x86_64
    kernel-devel-6.1.23-36.46.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.23-36.46

External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-160.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) NULL pointer dereference

EUVDB-ID: #VU75449

Risk: Low

CVSSv3.1: 4.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1583

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error within the io_file_bitmap_get() function in io_uring/filetable.c in the io_uring sub-component. A local user can trigger denial of service conditions via IORING_FILE_INDEX_ALLOC.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.aarch64
    python3-perf-6.1.23-36.46.amzn2023.aarch64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.aarch64
    bpftool-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-6.1.23-36.46.amzn2023.aarch64
    bpftool-6.1.23-36.46.amzn2023.aarch64
    perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-devel-6.1.23-36.46.amzn2023.aarch64
    perf-6.1.23-36.46.amzn2023.aarch64
    kernel-headers-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.23-36.46.amzn2023.aarch64
    kernel-devel-6.1.23-36.46.amzn2023.aarch64

src:
    kernel-6.1.23-36.46.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.x86_64
    bpftool-6.1.23-36.46.amzn2023.x86_64
    perf-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-6.1.23-36.46.amzn2023.x86_64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.x86_64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-devel-6.1.23-36.46.amzn2023.x86_64
    perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-headers-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.23-36.46.amzn2023.x86_64
    kernel-devel-6.1.23-36.46.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.23-36.46

External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-160.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU75204

Risk: Low

CVSSv3.1: 4.1 [CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-1611

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error within the btrfs_search_slot() function in fs/btrfs/ctree.c. A local user can trigger a use-after-free error and crash the kernel.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.aarch64
    python3-perf-6.1.23-36.46.amzn2023.aarch64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.aarch64
    bpftool-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-6.1.23-36.46.amzn2023.aarch64
    bpftool-6.1.23-36.46.amzn2023.aarch64
    perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-devel-6.1.23-36.46.amzn2023.aarch64
    perf-6.1.23-36.46.amzn2023.aarch64
    kernel-headers-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.23-36.46.amzn2023.aarch64
    kernel-devel-6.1.23-36.46.amzn2023.aarch64

src:
    kernel-6.1.23-36.46.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.x86_64
    bpftool-6.1.23-36.46.amzn2023.x86_64
    perf-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-6.1.23-36.46.amzn2023.x86_64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.x86_64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-devel-6.1.23-36.46.amzn2023.x86_64
    perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-headers-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.23-36.46.amzn2023.x86_64
    kernel-devel-6.1.23-36.46.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.23-36.46

External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-160.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Out-of-bounds write

EUVDB-ID: #VU77249

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-2194

CWE-ID: CWE-787 - Out-of-bounds write

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the Linux kernel's SLIMpro I2C device driver. A local user can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.

Mitigation

Update the affected packages:

aarch64:
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.aarch64
    python3-perf-6.1.23-36.46.amzn2023.aarch64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.aarch64
    bpftool-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-libbpf-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-6.1.23-36.46.amzn2023.aarch64
    bpftool-6.1.23-36.46.amzn2023.aarch64
    perf-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-tools-devel-6.1.23-36.46.amzn2023.aarch64
    perf-6.1.23-36.46.amzn2023.aarch64
    kernel-headers-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-6.1.23-36.46.amzn2023.aarch64
    kernel-6.1.23-36.46.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.23-36.46.amzn2023.aarch64
    kernel-devel-6.1.23-36.46.amzn2023.aarch64

src:
    kernel-6.1.23-36.46.amzn2023.src

x86_64:
    bpftool-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-static-6.1.23-36.46.amzn2023.x86_64
    bpftool-6.1.23-36.46.amzn2023.x86_64
    perf-6.1.23-36.46.amzn2023.x86_64
    kernel-libbpf-6.1.23-36.46.amzn2023.x86_64
    kernel-livepatch-6.1.23-36.46-1.0-0.amzn2023.x86_64
    kernel-libbpf-devel-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-devel-6.1.23-36.46.amzn2023.x86_64
    perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-6.1.23-36.46.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.23-36.46.amzn2023.x86_64
    python3-perf-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-headers-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-6.1.23-36.46.amzn2023.x86_64
    kernel-6.1.23-36.46.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.23-36.46.amzn2023.x86_64
    kernel-devel-6.1.23-36.46.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.23-36.46

External links

http://alas.aws.amazon.com/AL2023/ALAS-2023-160.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###