ALAS2KERNEL-5.15-2024-037


Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.15-2024-037
Advisory Released Date: 2024-02-05
Advisory Updated Date: 2025-05-21
Severity: Important

Issue Overview:

A flaw was found in the Linux kernel's Layer 2 Tunneling Protocol (L2TP). A missing lock when clearing sk_user_data can lead to a race condition and NULL pointer dereference. A local user could use this flaw to potentially crash the system causing a denial of service. (CVE-2022-4129)

In the Linux kernel, the following vulnerability has been resolved:

cpufreq: governor: Use kobject release() method to free dbs_data (CVE-2022-49513)

In the Linux kernel, the following vulnerability has been resolved:

ovl: Use "buf" flexible array for memcpy() destination (CVE-2022-49743)

In the Linux kernel, the following vulnerability has been resolved:

perf/x86/amd: fix potential integer overflow on shift of a int (CVE-2022-49748)

In the Linux kernel, the following vulnerability has been resolved:

device property: fix of node refcount leak in fwnode_graph_get_next_endpoint() (CVE-2022-49752)

In the Linux kernel, the following vulnerability has been resolved:

dmaengine: Fix double increment of client_count in dma_chan_get() (CVE-2022-49753)

A flaw was found in the Linux kernel, where unauthorized access to the execution of the setuid file with capabilities was found in the Linux kernel's OverlayFS subsystem in how a user copies a capable file from a nosuid mount into another mount. This uid mapping bug allows a local user to escalate their privileges on the system. (CVE-2023-0386)

A memory corruption flaw was found in the Linux kernel's human interface device (HID) subsystem in how a user inserts a malicious USB device. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2023-1073)

A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem. (CVE-2023-1652)

In the Linux kernel 6.0.8, there is a use-after-free in inode_cgwb_move_to_attached in fs/fs-writeback.c, related to __list_del_entry_valid. (CVE-2023-26605)

A flaw was found in the Framebuffer Console (fbcon) in the Linux Kernel. When providing a font->width and font->height greater than 32 to the fbcon_set_font, since there are no checks in place, a shift-out-of-bounds occurs, leading to undefined behavior and possible denial of service. (CVE-2023-3161)

A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. In this flaw an attacker with local user access may lead to a system crash or a leak of internal kernel information. (CVE-2023-3567)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Skip invalid kfunc call in backtrack_insn (CVE-2023-52928)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Fix potential bit_17 double-free (CVE-2023-52930)

In the Linux kernel, the following vulnerability has been resolved:

mm/swapfile: add cond_resched() in get_swap_pages() (CVE-2023-52932)

In the Linux kernel, the following vulnerability has been resolved:

Squashfs: fix handling and sanity checking of xattr_ids count (CVE-2023-52933)

In the Linux kernel, the following vulnerability has been resolved:

kernel/irq/irqdomain.c: fix memory leak with using debugfs_lookup() (CVE-2023-52936)

In the Linux kernel, the following vulnerability has been resolved:

vc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF (CVE-2023-52973)

In the Linux kernel, the following vulnerability has been resolved:

efi: fix potential NULL deref in efi_mem_reserve_persistent (CVE-2023-52976)

In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix flow memory leak in ovs_flow_cmd_new (CVE-2023-52977)

In the Linux kernel, the following vulnerability has been resolved:

squashfs: harden sanity check in squashfs_read_xattr_id_table (CVE-2023-52979)

In the Linux kernel, the following vulnerability has been resolved:

block, bfq: fix uaf for bfqq in bic_set_bfqq() (CVE-2023-52983)

In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Check for any of tcp_bpf_prots when cloning a listener (CVE-2023-52986)

In the Linux kernel, the following vulnerability has been resolved:

net: fix NULL pointer in skb_segment_list (CVE-2023-52991)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Skip task with pid=1 in send_signal_common() (CVE-2023-52992)

In the Linux kernel, the following vulnerability has been resolved:

x86/i8259: Mark legacy PIC interrupts with IRQ_LEVEL (CVE-2023-52993)

In the Linux kernel, the following vulnerability has been resolved:

ipv4: prevent potential spectre v1 gadget in fib_metrics_match() (CVE-2023-52996)

In the Linux kernel, the following vulnerability has been resolved:

ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() (CVE-2023-52997)

In the Linux kernel, the following vulnerability has been resolved:

net: fix UaF in netns ops registration error path (CVE-2023-52999)

In the Linux kernel, the following vulnerability has been resolved:

netlink: prevent potential spectre v1 gadgets (CVE-2023-53000)

In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix oops due to uncleared server->smbd_conn in reconnect (CVE-2023-53006)

In the Linux kernel, the following vulnerability has been resolved:

tracing: Make sure trace_printk() can output as soon as it can be used (CVE-2023-53007)

In the Linux kernel, the following vulnerability has been resolved:

net: mdio: validate parameter addr in mdiobus_get_phy() (CVE-2023-53019)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_taprio: fix possible use-after-free (CVE-2023-53021)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix pointer-leak due to insufficient speculative store bypass mitigation (CVE-2023-53024)

In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix use-after-free in nfsd4_ssc_setup_dul() (CVE-2023-53025)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Fix ib block iterator counter overflow (CVE-2023-53026)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.15.93-55.139.amzn2.aarch64
    kernel-headers-5.15.93-55.139.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.15.93-55.139.amzn2.aarch64
    perf-5.15.93-55.139.amzn2.aarch64
    perf-debuginfo-5.15.93-55.139.amzn2.aarch64
    python-perf-5.15.93-55.139.amzn2.aarch64
    python-perf-debuginfo-5.15.93-55.139.amzn2.aarch64
    kernel-tools-5.15.93-55.139.amzn2.aarch64
    kernel-tools-devel-5.15.93-55.139.amzn2.aarch64
    kernel-tools-debuginfo-5.15.93-55.139.amzn2.aarch64
    bpftool-5.15.93-55.139.amzn2.aarch64
    bpftool-debuginfo-5.15.93-55.139.amzn2.aarch64
    kernel-devel-5.15.93-55.139.amzn2.aarch64
    kernel-debuginfo-5.15.93-55.139.amzn2.aarch64
    kernel-livepatch-5.15.93-55.139-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.15.93-55.139.amzn2.i686

src:
    kernel-5.15.93-55.139.amzn2.src

x86_64:
    kernel-5.15.93-55.139.amzn2.x86_64
    kernel-headers-5.15.93-55.139.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.15.93-55.139.amzn2.x86_64
    perf-5.15.93-55.139.amzn2.x86_64
    perf-debuginfo-5.15.93-55.139.amzn2.x86_64
    python-perf-5.15.93-55.139.amzn2.x86_64
    python-perf-debuginfo-5.15.93-55.139.amzn2.x86_64
    kernel-tools-5.15.93-55.139.amzn2.x86_64
    kernel-tools-devel-5.15.93-55.139.amzn2.x86_64
    kernel-tools-debuginfo-5.15.93-55.139.amzn2.x86_64
    bpftool-5.15.93-55.139.amzn2.x86_64
    bpftool-debuginfo-5.15.93-55.139.amzn2.x86_64
    kernel-devel-5.15.93-55.139.amzn2.x86_64
    kernel-debuginfo-5.15.93-55.139.amzn2.x86_64
    kernel-livepatch-5.15.93-55.139-1.0-0.amzn2.x86_64

Changelog:

2025-05-21: CVE-2023-52936 was added to this advisory.

2025-05-21: CVE-2023-52992 was added to this advisory.

2025-05-21: CVE-2023-53007 was added to this advisory.

2025-05-21: CVE-2023-53024 was added to this advisory.

2025-05-21: CVE-2023-52976 was added to this advisory.

2025-05-21: CVE-2022-49752 was added to this advisory.

2025-05-21: CVE-2023-53019 was added to this advisory.

2025-05-21: CVE-2022-49743 was added to this advisory.

2025-05-21: CVE-2023-52928 was added to this advisory.

2025-05-21: CVE-2023-53006 was added to this advisory.

2025-05-21: CVE-2023-52986 was added to this advisory.

2025-05-21: CVE-2023-53000 was added to this advisory.

2025-05-21: CVE-2022-49513 was added to this advisory.

2025-05-21: CVE-2023-52996 was added to this advisory.

2025-05-21: CVE-2023-53026 was added to this advisory.

2025-05-21: CVE-2023-52979 was added to this advisory.

2025-05-21: CVE-2022-49748 was added to this advisory.

2025-05-21: CVE-2023-52932 was added to this advisory.

2025-05-21: CVE-2023-52991 was added to this advisory.

2025-05-21: CVE-2023-52933 was added to this advisory.

2025-05-21: CVE-2023-52993 was added to this advisory.

2025-05-21: CVE-2023-52977 was added to this advisory.

2025-05-21: CVE-2023-52997 was added to this advisory.

2025-04-23: CVE-2023-53021 was added to this advisory.

2025-04-23: CVE-2023-52983 was added to this advisory.

2025-04-23: CVE-2023-53025 was added to this advisory.

2025-04-23: CVE-2023-52999 was added to this advisory.

2025-04-23: CVE-2023-52930 was added to this advisory.

2025-04-23: CVE-2023-52973 was added to this advisory.

2025-04-23: CVE-2022-49753 was added to this advisory.

2024-06-06: CVE-2023-0386 was added to this advisory.

2024-02-15: CVE-2022-4129 was added to this advisory.

2024-02-15: CVE-2023-3567 was added to this advisory.

2024-02-15: CVE-2023-3161 was added to this advisory.

2024-02-15: CVE-2023-1652 was added to this advisory.