Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.10-2023-029
Advisory Released Date: 2023-04-17
Advisory Updated Date: 2025-06-27
FAQs regarding Amazon Linux ALAS/CVE Severity
A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service. (CVE-2022-4379)
In the Linux kernel, the following vulnerability has been resolved:
gfs2: Always check inode size of inline inodes (CVE-2022-49739)
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea (CVE-2023-1611)
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. (CVE-2023-2194)
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). (CVE-2023-28466)
The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. (CVE-2023-33203)
In the Linux kernel, the following vulnerability has been resolved:
nilfs2: fix kernel-infoleak in nilfs_ioctl_wrap_copy() (CVE-2023-53035)
In the Linux kernel, the following vulnerability has been resolved:
dm crypt: add cond_resched() to dmcrypt_write() (CVE-2023-53051)
In the Linux kernel, the following vulnerability has been resolved:
erspan: do not use skb_mac_header() in ndo_start_xmit() (CVE-2023-53053)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: E-Switch, Fix an Oops in error handling code (CVE-2023-53058)
In the Linux kernel, the following vulnerability has been resolved:
net: usb: smsc95xx: Limit packet length to skb->len (CVE-2023-53062)
In the Linux kernel, the following vulnerability has been resolved:
qed/qed_sriov: guard against NULL derefs from qed_iov_get_vf_info (CVE-2023-53066)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix steering rules cleanup (CVE-2023-53079)
In the Linux kernel, the following vulnerability has been resolved:
xsk: Add missing overflow check in xdp_umem_reg (CVE-2023-53080)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.10 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.10.177-158.645.amzn2.aarch64
kernel-headers-5.10.177-158.645.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.10.177-158.645.amzn2.aarch64
perf-5.10.177-158.645.amzn2.aarch64
perf-debuginfo-5.10.177-158.645.amzn2.aarch64
python-perf-5.10.177-158.645.amzn2.aarch64
python-perf-debuginfo-5.10.177-158.645.amzn2.aarch64
kernel-tools-5.10.177-158.645.amzn2.aarch64
kernel-tools-devel-5.10.177-158.645.amzn2.aarch64
kernel-tools-debuginfo-5.10.177-158.645.amzn2.aarch64
bpftool-5.10.177-158.645.amzn2.aarch64
bpftool-debuginfo-5.10.177-158.645.amzn2.aarch64
kernel-devel-5.10.177-158.645.amzn2.aarch64
kernel-debuginfo-5.10.177-158.645.amzn2.aarch64
kernel-livepatch-5.10.177-158.645-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.10.177-158.645.amzn2.i686
src:
kernel-5.10.177-158.645.amzn2.src
x86_64:
kernel-5.10.177-158.645.amzn2.x86_64
kernel-headers-5.10.177-158.645.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.10.177-158.645.amzn2.x86_64
perf-5.10.177-158.645.amzn2.x86_64
perf-debuginfo-5.10.177-158.645.amzn2.x86_64
python-perf-5.10.177-158.645.amzn2.x86_64
python-perf-debuginfo-5.10.177-158.645.amzn2.x86_64
kernel-tools-5.10.177-158.645.amzn2.x86_64
kernel-tools-devel-5.10.177-158.645.amzn2.x86_64
kernel-tools-debuginfo-5.10.177-158.645.amzn2.x86_64
bpftool-5.10.177-158.645.amzn2.x86_64
bpftool-debuginfo-5.10.177-158.645.amzn2.x86_64
kernel-devel-5.10.177-158.645.amzn2.x86_64
kernel-debuginfo-5.10.177-158.645.amzn2.x86_64
kernel-livepatch-5.10.177-158.645-1.0-0.amzn2.x86_64
2025-06-27: CVE-2023-53062 was added to this advisory.
2025-06-19: CVE-2023-53080 was added to this advisory.
2025-06-19: CVE-2023-53053 was added to this advisory.
2025-06-19: CVE-2023-53058 was added to this advisory.
2025-06-19: CVE-2023-53079 was added to this advisory.
2025-06-19: CVE-2023-53051 was added to this advisory.
2025-06-19: CVE-2023-53066 was added to this advisory.
2025-06-19: CVE-2023-53035 was added to this advisory.
2025-05-21: CVE-2022-49739 was added to this advisory.
2024-07-03: CVE-2023-1611 was added to this advisory.