Lucene search

K
amazonAmazonALAS-2023-1735
HistoryApr 27, 2023 - 4:19 p.m.

Important: kernel

2023-04-2716:19:00
alas.aws.amazon.com
25

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

18.3%

Issue Overview:

2023-06-29: CVE-2023-33203 was added to this advisory.

2023-06-07: CVE-2023-1838 was added to this advisory.

The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. (CVE-2023-33203)

A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. (CVE-2023-1838)

An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2023-2124)

cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). (CVE-2023-23454)

Affected Packages:

kernel

Issue Correction:
Run yum update kernel to update your system.

New Packages:

i686:  
    kernel-debuginfo-common-i686-4.14.313-162.533.amzn1.i686  
    kernel-tools-debuginfo-4.14.313-162.533.amzn1.i686  
    kernel-devel-4.14.313-162.533.amzn1.i686  
    perf-debuginfo-4.14.313-162.533.amzn1.i686  
    kernel-headers-4.14.313-162.533.amzn1.i686  
    perf-4.14.313-162.533.amzn1.i686  
    kernel-4.14.313-162.533.amzn1.i686  
    kernel-tools-4.14.313-162.533.amzn1.i686  
    kernel-debuginfo-4.14.313-162.533.amzn1.i686  
    kernel-tools-devel-4.14.313-162.533.amzn1.i686  
  
src:  
    kernel-4.14.313-162.533.amzn1.src  
  
x86_64:  
    kernel-tools-debuginfo-4.14.313-162.533.amzn1.x86_64  
    kernel-4.14.313-162.533.amzn1.x86_64  
    kernel-tools-devel-4.14.313-162.533.amzn1.x86_64  
    kernel-debuginfo-common-x86_64-4.14.313-162.533.amzn1.x86_64  
    perf-4.14.313-162.533.amzn1.x86_64  
    kernel-headers-4.14.313-162.533.amzn1.x86_64  
    kernel-debuginfo-4.14.313-162.533.amzn1.x86_64  
    kernel-tools-4.14.313-162.533.amzn1.x86_64  
    kernel-devel-4.14.313-162.533.amzn1.x86_64  
    perf-debuginfo-4.14.313-162.533.amzn1.x86_64  

Additional References

Red Hat: CVE-2023-1838, CVE-2023-2124, CVE-2023-23454, CVE-2023-33203

Mitre: CVE-2023-1838, CVE-2023-2124, CVE-2023-23454, CVE-2023-33203

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

4.3 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

18.3%