Lucene search

K
amazonAmazonALAS2-2023-2100
HistoryJun 21, 2023 - 7:11 p.m.

Important: kernel

2023-06-2119:11:00
alas.aws.amazon.com
27

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

78.0%

Issue Overview:

2023-07-17: CVE-2023-3090 was added to this advisory.

A use-after-free flaw was found in nf_tables cross-table in the net/netfilter/nf_tables_api.c function in the Linux kernel. This flaw allows a local, privileged attacker to cause a use-after-free problem at the time of table deletion, possibly leading to local privilege escalation. (CVE-2022-2586)

A heap buffer overflow flaw was found in the Linux kernel’s Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-34918)

A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component. (CVE-2023-2269)

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). (CVE-2023-28466)

A use after free vulnerability was found in prepare_to_relocate in fs/btrfs/relocation.c in btrfs in the Linux Kernel. This possible flaw can be triggered by calling btrfs_ioctl_balance() before calling btrfs_ioctl_defrag(). (CVE-2023-3111)

A heap out-of-bounds write vulnerability in the Linux Kernel ipvlan network driver can be exploited to achieve local privilege escalation.

The out-of-bounds write is caused by missing skb->cb initialization in the ipvlan network driver. The vulnerability is reachable if CONFIG_IPVLAN is enabled.

We recommend upgrading past commit 90cbed5247439a966b645b34eb0a2e037836ea8e.

An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. (CVE-2023-34256)

Affected Packages:

kernel

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update kernel to update your system.

New Packages:

aarch64:  
    kernel-4.14.318-240.529.amzn2.aarch64  
    kernel-headers-4.14.318-240.529.amzn2.aarch64  
    kernel-debuginfo-common-aarch64-4.14.318-240.529.amzn2.aarch64  
    perf-4.14.318-240.529.amzn2.aarch64  
    perf-debuginfo-4.14.318-240.529.amzn2.aarch64  
    python-perf-4.14.318-240.529.amzn2.aarch64  
    python-perf-debuginfo-4.14.318-240.529.amzn2.aarch64  
    kernel-tools-4.14.318-240.529.amzn2.aarch64  
    kernel-tools-devel-4.14.318-240.529.amzn2.aarch64  
    kernel-tools-debuginfo-4.14.318-240.529.amzn2.aarch64  
    kernel-devel-4.14.318-240.529.amzn2.aarch64  
    kernel-debuginfo-4.14.318-240.529.amzn2.aarch64  
  
i686:  
    kernel-headers-4.14.318-240.529.amzn2.i686  
  
src:  
    kernel-4.14.318-240.529.amzn2.src  
  
x86_64:  
    kernel-4.14.318-240.529.amzn2.x86_64  
    kernel-headers-4.14.318-240.529.amzn2.x86_64  
    kernel-debuginfo-common-x86_64-4.14.318-240.529.amzn2.x86_64  
    perf-4.14.318-240.529.amzn2.x86_64  
    perf-debuginfo-4.14.318-240.529.amzn2.x86_64  
    python-perf-4.14.318-240.529.amzn2.x86_64  
    python-perf-debuginfo-4.14.318-240.529.amzn2.x86_64  
    kernel-tools-4.14.318-240.529.amzn2.x86_64  
    kernel-tools-devel-4.14.318-240.529.amzn2.x86_64  
    kernel-tools-debuginfo-4.14.318-240.529.amzn2.x86_64  
    kernel-devel-4.14.318-240.529.amzn2.x86_64  
    kernel-debuginfo-4.14.318-240.529.amzn2.x86_64  
    kernel-livepatch-4.14.318-240.529-1.0-0.amzn2.x86_64  

Additional References

Red Hat: CVE-2022-2586, CVE-2022-34918, CVE-2023-2269, CVE-2023-28466, CVE-2023-3090, CVE-2023-3111, CVE-2023-34256

Mitre: CVE-2022-2586, CVE-2022-34918, CVE-2023-2269, CVE-2023-28466, CVE-2023-3090, CVE-2023-3111, CVE-2023-34256

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.6 High

AI Score

Confidence

High

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

78.0%