Amazon Linux AMI update for kernel



Risk Low
Patch available YES
Number of vulnerabilities 5
CVE-ID CVE-2023-0160
CVE-2023-2269
CVE-2023-32233
CVE-2023-34256
CVE-2024-0775
CWE-ID CWE-667
CWE-416
CWE-125
Exploitation vector Local
Public exploit Public exploit code for vulnerability #3 is available.
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

kernel
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 5 vulnerabilities.

1) Improper locking

EUVDB-ID: #VU90810

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-0160

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper locking within the __sock_map_delete() and sock_hash_delete_elem() functions in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-6.1.29-47.49.amzn2023.aarch64
    bpftool-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-6.1.29-47.49.amzn2023.aarch64
    perf-6.1.29-47.49.amzn2023.aarch64
    perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.aarch64
    python3-perf-6.1.29-47.49.amzn2023.aarch64
    kernel-headers-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.aarch64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.29-47.49.amzn2023.aarch64
    kernel-devel-6.1.29-47.49.amzn2023.aarch64

src:
    kernel-6.1.29-47.49.amzn2023.src

x86_64:
    kernel-libbpf-6.1.29-47.49.amzn2023.x86_64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.x86_64
    bpftool-6.1.29-47.49.amzn2023.x86_64
    python3-perf-6.1.29-47.49.amzn2023.x86_64
    kernel-headers-6.1.29-47.49.amzn2023.x86_64
    bpftool-debuginfo-6.1.29-47.49.amzn2023.x86_64
    perf-6.1.29-47.49.amzn2023.x86_64
    perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.x86_64
    kernel-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-6.1.29-47.49.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.29-47.49.amzn2023.x86_64
    kernel-devel-6.1.29-47.49.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.29-47.49

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-184.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper locking

EUVDB-ID: #VU77243

Risk: Low

CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-2269

CWE-ID: CWE-667 - Improper Locking

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service attack (DoS).

The vulnerability exists due to double-locking error in table_clear in drivers/md/dm-ioctl.c. A local user can perform a denial of service (DoS) attack.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-6.1.29-47.49.amzn2023.aarch64
    bpftool-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-6.1.29-47.49.amzn2023.aarch64
    perf-6.1.29-47.49.amzn2023.aarch64
    perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.aarch64
    python3-perf-6.1.29-47.49.amzn2023.aarch64
    kernel-headers-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.aarch64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.29-47.49.amzn2023.aarch64
    kernel-devel-6.1.29-47.49.amzn2023.aarch64

src:
    kernel-6.1.29-47.49.amzn2023.src

x86_64:
    kernel-libbpf-6.1.29-47.49.amzn2023.x86_64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.x86_64
    bpftool-6.1.29-47.49.amzn2023.x86_64
    python3-perf-6.1.29-47.49.amzn2023.x86_64
    kernel-headers-6.1.29-47.49.amzn2023.x86_64
    bpftool-debuginfo-6.1.29-47.49.amzn2023.x86_64
    perf-6.1.29-47.49.amzn2023.x86_64
    perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.x86_64
    kernel-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-6.1.29-47.49.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.29-47.49.amzn2023.x86_64
    kernel-devel-6.1.29-47.49.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.29-47.49

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-184.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Use-after-free

EUVDB-ID: #VU75807

Risk: Low

CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2023-32233

CWE-ID: CWE-416 - Use After Free

Exploit availability: Yes

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in Netfilter nf_tables when processing batch requests. A local user can trigger a use-after-free error and execute arbitrary code with root privileges.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-6.1.29-47.49.amzn2023.aarch64
    bpftool-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-6.1.29-47.49.amzn2023.aarch64
    perf-6.1.29-47.49.amzn2023.aarch64
    perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.aarch64
    python3-perf-6.1.29-47.49.amzn2023.aarch64
    kernel-headers-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.aarch64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.29-47.49.amzn2023.aarch64
    kernel-devel-6.1.29-47.49.amzn2023.aarch64

src:
    kernel-6.1.29-47.49.amzn2023.src

x86_64:
    kernel-libbpf-6.1.29-47.49.amzn2023.x86_64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.x86_64
    bpftool-6.1.29-47.49.amzn2023.x86_64
    python3-perf-6.1.29-47.49.amzn2023.x86_64
    kernel-headers-6.1.29-47.49.amzn2023.x86_64
    bpftool-debuginfo-6.1.29-47.49.amzn2023.x86_64
    perf-6.1.29-47.49.amzn2023.x86_64
    perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.x86_64
    kernel-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-6.1.29-47.49.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.29-47.49.amzn2023.x86_64
    kernel-devel-6.1.29-47.49.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.29-47.49

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-184.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.

4) Out-of-bounds read

EUVDB-ID: #VU77624

Risk: Low

CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-34256

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition within crc16 in lib/crc16.c when called from fs/ext4/super.c. A local user can trigger an out-of-bounds read error and crash the kernel.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-6.1.29-47.49.amzn2023.aarch64
    bpftool-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-6.1.29-47.49.amzn2023.aarch64
    perf-6.1.29-47.49.amzn2023.aarch64
    perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.aarch64
    python3-perf-6.1.29-47.49.amzn2023.aarch64
    kernel-headers-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.aarch64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.29-47.49.amzn2023.aarch64
    kernel-devel-6.1.29-47.49.amzn2023.aarch64

src:
    kernel-6.1.29-47.49.amzn2023.src

x86_64:
    kernel-libbpf-6.1.29-47.49.amzn2023.x86_64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.x86_64
    bpftool-6.1.29-47.49.amzn2023.x86_64
    python3-perf-6.1.29-47.49.amzn2023.x86_64
    kernel-headers-6.1.29-47.49.amzn2023.x86_64
    bpftool-debuginfo-6.1.29-47.49.amzn2023.x86_64
    perf-6.1.29-47.49.amzn2023.x86_64
    perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.x86_64
    kernel-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-6.1.29-47.49.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.29-47.49.amzn2023.x86_64
    kernel-devel-6.1.29-47.49.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.29-47.49

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-184.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Use-after-free

EUVDB-ID: #VU86576

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2024-0775

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the __ext4_remount() function in fs/ext4/super.c in ext4. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Mitigation

Update the affected packages:

aarch64:
    bpftool-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-6.1.29-47.49.amzn2023.aarch64
    bpftool-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-6.1.29-47.49.amzn2023.aarch64
    perf-6.1.29-47.49.amzn2023.aarch64
    perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.aarch64
    python3-perf-6.1.29-47.49.amzn2023.aarch64
    kernel-headers-6.1.29-47.49.amzn2023.aarch64
    kernel-tools-devel-6.1.29-47.49.amzn2023.aarch64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.aarch64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-6.1.29-47.49.amzn2023.aarch64
    kernel-6.1.29-47.49.amzn2023.aarch64
    kernel-debuginfo-common-aarch64-6.1.29-47.49.amzn2023.aarch64
    kernel-devel-6.1.29-47.49.amzn2023.aarch64

src:
    kernel-6.1.29-47.49.amzn2023.src

x86_64:
    kernel-libbpf-6.1.29-47.49.amzn2023.x86_64
    python3-perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-static-6.1.29-47.49.amzn2023.x86_64
    kernel-libbpf-devel-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-6.1.29-47.49.amzn2023.x86_64
    kernel-tools-debuginfo-6.1.29-47.49.amzn2023.x86_64
    bpftool-6.1.29-47.49.amzn2023.x86_64
    python3-perf-6.1.29-47.49.amzn2023.x86_64
    kernel-headers-6.1.29-47.49.amzn2023.x86_64
    bpftool-debuginfo-6.1.29-47.49.amzn2023.x86_64
    perf-6.1.29-47.49.amzn2023.x86_64
    perf-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-livepatch-6.1.29-47.49-1.0-0.amzn2023.x86_64
    kernel-debuginfo-6.1.29-47.49.amzn2023.x86_64
    kernel-6.1.29-47.49.amzn2023.x86_64
    kernel-debuginfo-common-x86_64-6.1.29-47.49.amzn2023.x86_64
    kernel-devel-6.1.29-47.49.amzn2023.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

kernel: before 6.1.29-47.49

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-184.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###