Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.15-2023-016
Advisory Released Date: 2023-04-17
Advisory Updated Date: 2025-07-03
FAQs regarding Amazon Linux ALAS/CVE Severity
2025-07-03: CVE-2023-53055 was added to this advisory.
2025-06-19: CVE-2023-53080 was added to this advisory.
2025-06-19: CVE-2023-53053 was added to this advisory.
2025-06-19: CVE-2023-53058 was added to this advisory.
2025-06-19: CVE-2023-53079 was added to this advisory.
2025-06-19: CVE-2023-53051 was added to this advisory.
2024-07-03: CVE-2023-1611 was added to this advisory.
A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. (CVE-2022-4269)
A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service. (CVE-2022-4379)
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea (CVE-2023-1611)
An out-of-bounds write vulnerability was found in the Linux kernel's SLIMpro I2C device driver. The userspace "data->block[0]" variable was not capped to a number between 0-255 and was used as the size of a memcpy, possibly writing beyond the end of dma_buffer. This flaw could allow a local privileged user to crash the system or potentially achieve code execution. (CVE-2023-2194)
do_tls_getsockopt in net/tls/tls_main.c in the Linux kernel through 6.2.6 lacks a lock_sock call, leading to a race condition (with a resultant use-after-free or NULL pointer dereference). (CVE-2023-28466)
In the Linux kernel, the following vulnerability has been resolved:
dm crypt: add cond_resched() to dmcrypt_write() (CVE-2023-53051)
In the Linux kernel, the following vulnerability has been resolved:
erspan: do not use skb_mac_header() in ndo_start_xmit() (CVE-2023-53053)
In the Linux kernel, the following vulnerability has been resolved:
fscrypt: destroy keyring after security_sb_delete() (CVE-2023-53055)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: E-Switch, Fix an Oops in error handling code (CVE-2023-53058)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix steering rules cleanup (CVE-2023-53079)
In the Linux kernel, the following vulnerability has been resolved:
xsk: Add missing overflow check in xdp_umem_reg (CVE-2023-53080)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.15.106-64.140.amzn2.aarch64
kernel-headers-5.15.106-64.140.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.15.106-64.140.amzn2.aarch64
perf-5.15.106-64.140.amzn2.aarch64
perf-debuginfo-5.15.106-64.140.amzn2.aarch64
python-perf-5.15.106-64.140.amzn2.aarch64
python-perf-debuginfo-5.15.106-64.140.amzn2.aarch64
kernel-tools-5.15.106-64.140.amzn2.aarch64
kernel-tools-devel-5.15.106-64.140.amzn2.aarch64
kernel-tools-debuginfo-5.15.106-64.140.amzn2.aarch64
bpftool-5.15.106-64.140.amzn2.aarch64
bpftool-debuginfo-5.15.106-64.140.amzn2.aarch64
kernel-devel-5.15.106-64.140.amzn2.aarch64
kernel-debuginfo-5.15.106-64.140.amzn2.aarch64
kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.aarch64
i686:
kernel-headers-5.15.106-64.140.amzn2.i686
src:
kernel-5.15.106-64.140.amzn2.src
x86_64:
kernel-5.15.106-64.140.amzn2.x86_64
kernel-headers-5.15.106-64.140.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.15.106-64.140.amzn2.x86_64
perf-5.15.106-64.140.amzn2.x86_64
perf-debuginfo-5.15.106-64.140.amzn2.x86_64
python-perf-5.15.106-64.140.amzn2.x86_64
python-perf-debuginfo-5.15.106-64.140.amzn2.x86_64
kernel-tools-5.15.106-64.140.amzn2.x86_64
kernel-tools-devel-5.15.106-64.140.amzn2.x86_64
kernel-tools-debuginfo-5.15.106-64.140.amzn2.x86_64
bpftool-5.15.106-64.140.amzn2.x86_64
bpftool-debuginfo-5.15.106-64.140.amzn2.x86_64
kernel-devel-5.15.106-64.140.amzn2.x86_64
kernel-debuginfo-5.15.106-64.140.amzn2.x86_64
kernel-livepatch-5.15.106-64.140-1.0-0.amzn2.x86_64
2025-07-03: CVE-2023-53055 was added to this advisory.
2025-06-19: CVE-2023-53080 was added to this advisory.
2025-06-19: CVE-2023-53053 was added to this advisory.
2025-06-19: CVE-2023-53058 was added to this advisory.
2025-06-19: CVE-2023-53079 was added to this advisory.
2025-06-19: CVE-2023-53051 was added to this advisory.
2024-07-03: CVE-2023-1611 was added to this advisory.