Amazon Linux 2 Security Advisory: ALAS2-2023-2027
Advisory Released Date: 2023-05-02
Advisory Updated Date: 2025-06-27
FAQs regarding Amazon Linux ALAS/CVE Severity
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. (CVE-2023-1838)
An insufficient permission check has been found in the Bluetooth subsystem of
the Linux kernel when handling ioctl system calls of HCI sockets. This causes
tasks without the proper CAP_NET_ADMIN capability can easily mark HCI sockets
as _trusted_. Trusted sockets are intended to enable the sending and receiving
of management commands and events, such as pairing or connecting with a new
device. As a result, unprivileged users can acquire a trusted socket, leading
to unauthorized execution of management commands. The exploit requires only
the presence of a set of commonly used setuid programs (e.g., su, sudo). (CVE-2023-2002)
An out-of-bounds memory access flaw was found in the Linux kernel's XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2023-2124)
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. (CVE-2023-2194)
cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). (CVE-2023-23454)
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. (CVE-2023-33203)
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (CVE-2023-53035)
In the Linux kernel, the following vulnerability has been resolved:
dm crypt: add cond_resched() to dmcrypt_write() (CVE-2023-53051)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: smsc95xx: Limit packet length to skb->len (CVE-2023-53062)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-4.14.313-235.533.amzn2.aarch64
kernel-headers-4.14.313-235.533.amzn2.aarch64
kernel-debuginfo-common-aarch64-4.14.313-235.533.amzn2.aarch64
perf-4.14.313-235.533.amzn2.aarch64
perf-debuginfo-4.14.313-235.533.amzn2.aarch64
python-perf-4.14.313-235.533.amzn2.aarch64
python-perf-debuginfo-4.14.313-235.533.amzn2.aarch64
kernel-tools-4.14.313-235.533.amzn2.aarch64
kernel-tools-devel-4.14.313-235.533.amzn2.aarch64
kernel-tools-debuginfo-4.14.313-235.533.amzn2.aarch64
kernel-devel-4.14.313-235.533.amzn2.aarch64
kernel-debuginfo-4.14.313-235.533.amzn2.aarch64
i686:
kernel-headers-4.14.313-235.533.amzn2.i686
src:
kernel-4.14.313-235.533.amzn2.src
x86_64:
kernel-4.14.313-235.533.amzn2.x86_64
kernel-headers-4.14.313-235.533.amzn2.x86_64
kernel-debuginfo-common-x86_64-4.14.313-235.533.amzn2.x86_64
perf-4.14.313-235.533.amzn2.x86_64
perf-debuginfo-4.14.313-235.533.amzn2.x86_64
python-perf-4.14.313-235.533.amzn2.x86_64
python-perf-debuginfo-4.14.313-235.533.amzn2.x86_64
kernel-tools-4.14.313-235.533.amzn2.x86_64
kernel-tools-devel-4.14.313-235.533.amzn2.x86_64
kernel-tools-debuginfo-4.14.313-235.533.amzn2.x86_64
kernel-devel-4.14.313-235.533.amzn2.x86_64
kernel-debuginfo-4.14.313-235.533.amzn2.x86_64
kernel-livepatch-4.14.313-235.533-1.0-0.amzn2.x86_64
2025-06-27: CVE-2023-53062 was added to this advisory.
2025-06-12: CVE-2023-53051 was added to this advisory.
2025-06-12: CVE-2023-53035 was added to this advisory.