ALAS2KERNEL-5.15-2023-016


Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.15-2023-016
Advisory Released Date: 2023-04-17
Advisory Updated Date: 2025-07-03
Severity: Important

Issue Overview:

2025-07-03: CVE-2023-53055 was added to this advisory.

2025-06-19: CVE-2023-53080 was added to this advisory.

2025-06-19: CVE-2023-53053 was added to this advisory.

2025-06-19: CVE-2023-53058 was added to this advisory.

2025-06-19: CVE-2023-53079 was added to this advisory.

2025-06-19: CVE-2023-53051 was added to this advisory.

2024-07-03: CVE-2023-1611 was added to this advisory.

A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. (CVE-2022-4269)

A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service. (CVE-2022-4379)

A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea (CVE-2023-1611)

An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. (CVE-2023-2194)

do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). (CVE-2023-28466)

In the Linux kernel, the following vulnerability has been resolved:

dm crypt: add cond_resched() to dmcrypt_write() (CVE-2023-53051)

In the Linux kernel, the following vulnerability has been resolved:

erspan: do not use skb_mac_header() in ndo_start_xmit() (CVE-2023-53053)

In the Linux kernel, the following vulnerability has been resolved:

fscrypt: destroy keyring after security_sb_delete() (CVE-2023-53055)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: E-Switch, Fix an Oops in error handling code (CVE-2023-53058)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix steering rules cleanup (CVE-2023-53079)

In the Linux kernel, the following vulnerability has been resolved:

xsk: Add missing overflow check in xdp_umem_reg (CVE-2023-53080)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.15.106-64.140.amzn2.aarch64
    kernel-headers-5.15.106-64.140.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.15.106-64.140.amzn2.aarch64
    perf-5.15.106-64.140.amzn2.aarch64
    perf-debuginfo-5.15.106-64.140.amzn2.aarch64
    python-perf-5.15.106-64.140.amzn2.aarch64
    python-perf-debuginfo-5.15.106-64.140.amzn2.aarch64
    kernel-tools-5.15.106-64.140.amzn2.aarch64
    kernel-tools-devel-5.15.106-64.140.amzn2.aarch64
    kernel-tools-debuginfo-5.15.106-64.140.amzn2.aarch64
    bpftool-5.15.106-64.140.amzn2.aarch64
    bpftool-debuginfo-5.15.106-64.140.amzn2.aarch64
    kernel-devel-5.15.106-64.140.amzn2.aarch64
    kernel-debuginfo-5.15.106-64.140.amzn2.aarch64
    kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.15.106-64.140.amzn2.i686

src:
    kernel-5.15.106-64.140.amzn2.src

x86_64:
    kernel-5.15.106-64.140.amzn2.x86_64
    kernel-headers-5.15.106-64.140.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.15.106-64.140.amzn2.x86_64
    perf-5.15.106-64.140.amzn2.x86_64
    perf-debuginfo-5.15.106-64.140.amzn2.x86_64
    python-perf-5.15.106-64.140.amzn2.x86_64
    python-perf-debuginfo-5.15.106-64.140.amzn2.x86_64
    kernel-tools-5.15.106-64.140.amzn2.x86_64
    kernel-tools-devel-5.15.106-64.140.amzn2.x86_64
    kernel-tools-debuginfo-5.15.106-64.140.amzn2.x86_64
    bpftool-5.15.106-64.140.amzn2.x86_64
    bpftool-debuginfo-5.15.106-64.140.amzn2.x86_64
    kernel-devel-5.15.106-64.140.amzn2.x86_64
    kernel-debuginfo-5.15.106-64.140.amzn2.x86_64
    kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.x86_64

Changelog:

2025-07-03: CVE-2023-53055 was added to this advisory.

2025-06-19: CVE-2023-53080 was added to this advisory.

2025-06-19: CVE-2023-53053 was added to this advisory.

2025-06-19: CVE-2023-53058 was added to this advisory.

2025-06-19: CVE-2023-53079 was added to this advisory.

2025-06-19: CVE-2023-53051 was added to this advisory.

2024-07-03: CVE-2023-1611 was added to this advisory.