Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2021-3997 CVE-2022-4415 CVE-2022-45873 |
CWE-ID | CWE-674 CWE-269 CWE-400 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system systemd Operating systems & Components / Operating system package or component |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU59358
Risk: Low
CVSSv4.0: 5.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/U:Clear]
CVE-ID: CVE-2021-3997
CWE-ID:
CWE-674 - Uncontrolled Recursion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to uncontrolled recursion in systemd-tmpfiles. A local user can create multiple nested directories in the /tmp folder and case systemd to crash during the system boot.
Update the affected packages:
aarch64:Vulnerable software versions
systemd-resolved-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-sysusers-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-sysusers-252.4-1161.amzn2023.0.1.aarch64
systemd-pam-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-libs-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-udev-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-journal-remote-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-networkd-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-tmpfiles-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-container-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-networkd-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-container-252.4-1161.amzn2023.0.1.aarch64
systemd-pam-252.4-1161.amzn2023.0.1.aarch64
systemd-devel-252.4-1161.amzn2023.0.1.aarch64
systemd-resolved-252.4-1161.amzn2023.0.1.aarch64
systemd-libs-252.4-1161.amzn2023.0.1.aarch64
systemd-journal-remote-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-tmpfiles-252.4-1161.amzn2023.0.1.aarch64
systemd-tests-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-debugsource-252.4-1161.amzn2023.0.1.aarch64
systemd-udev-252.4-1161.amzn2023.0.1.aarch64
systemd-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-252.4-1161.amzn2023.0.1.aarch64
systemd-tests-252.4-1161.amzn2023.0.1.aarch64
noarch:
systemd-oomd-defaults-252.4-1161.amzn2023.0.1.noarch
systemd-rpm-macros-252.4-1161.amzn2023.0.1.noarch
src:
systemd-252.4-1161.amzn2023.0.1.src
x86_64:
systemd-resolved-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-udev-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-sysusers-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-journal-remote-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-networkd-252.4-1161.amzn2023.0.1.x86_64
systemd-networkd-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-libs-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-resolved-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-tmpfiles-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-pam-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-tmpfiles-252.4-1161.amzn2023.0.1.x86_64
systemd-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-devel-252.4-1161.amzn2023.0.1.x86_64
systemd-container-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-sysusers-252.4-1161.amzn2023.0.1.x86_64
systemd-libs-252.4-1161.amzn2023.0.1.x86_64
systemd-journal-remote-252.4-1161.amzn2023.0.1.x86_64
systemd-container-252.4-1161.amzn2023.0.1.x86_64
systemd-pam-252.4-1161.amzn2023.0.1.x86_64
systemd-udev-252.4-1161.amzn2023.0.1.x86_64
systemd-252.4-1161.amzn2023.0.1.x86_64
systemd-debugsource-252.4-1161.amzn2023.0.1.x86_64
systemd-tests-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-tests-252.4-1161.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
systemd: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-025.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU70461
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-4415
CWE-ID:
CWE-269 - Improper Privilege Management
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to improper privilege management when handling coredumps in coredump/coredump.c. A local user can gain access to sensitive information.
The vulnerability affects systems with libacl support.
Update the affected packages:
aarch64:Vulnerable software versions
systemd-resolved-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-sysusers-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-sysusers-252.4-1161.amzn2023.0.1.aarch64
systemd-pam-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-libs-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-udev-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-journal-remote-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-networkd-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-tmpfiles-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-container-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-networkd-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-container-252.4-1161.amzn2023.0.1.aarch64
systemd-pam-252.4-1161.amzn2023.0.1.aarch64
systemd-devel-252.4-1161.amzn2023.0.1.aarch64
systemd-resolved-252.4-1161.amzn2023.0.1.aarch64
systemd-libs-252.4-1161.amzn2023.0.1.aarch64
systemd-journal-remote-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-tmpfiles-252.4-1161.amzn2023.0.1.aarch64
systemd-tests-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-debugsource-252.4-1161.amzn2023.0.1.aarch64
systemd-udev-252.4-1161.amzn2023.0.1.aarch64
systemd-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-252.4-1161.amzn2023.0.1.aarch64
systemd-tests-252.4-1161.amzn2023.0.1.aarch64
noarch:
systemd-oomd-defaults-252.4-1161.amzn2023.0.1.noarch
systemd-rpm-macros-252.4-1161.amzn2023.0.1.noarch
src:
systemd-252.4-1161.amzn2023.0.1.src
x86_64:
systemd-resolved-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-udev-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-sysusers-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-journal-remote-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-networkd-252.4-1161.amzn2023.0.1.x86_64
systemd-networkd-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-libs-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-resolved-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-tmpfiles-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-pam-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-tmpfiles-252.4-1161.amzn2023.0.1.x86_64
systemd-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-devel-252.4-1161.amzn2023.0.1.x86_64
systemd-container-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-sysusers-252.4-1161.amzn2023.0.1.x86_64
systemd-libs-252.4-1161.amzn2023.0.1.x86_64
systemd-journal-remote-252.4-1161.amzn2023.0.1.x86_64
systemd-container-252.4-1161.amzn2023.0.1.x86_64
systemd-pam-252.4-1161.amzn2023.0.1.x86_64
systemd-udev-252.4-1161.amzn2023.0.1.x86_64
systemd-252.4-1161.amzn2023.0.1.x86_64
systemd-debugsource-252.4-1161.amzn2023.0.1.x86_64
systemd-tests-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-tests-252.4-1161.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
systemd: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-025.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72887
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-45873
CWE-ID:
CWE-400 - Resource exhaustion
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a deadlock within the parse_elf_object() function in shared/elf-util.c. A local user can perform a denial of service (DoS) attack.
Update the affected packages:
aarch64:Vulnerable software versions
systemd-resolved-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-sysusers-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-sysusers-252.4-1161.amzn2023.0.1.aarch64
systemd-pam-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-libs-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-udev-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-journal-remote-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-networkd-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-tmpfiles-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-container-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-networkd-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-container-252.4-1161.amzn2023.0.1.aarch64
systemd-pam-252.4-1161.amzn2023.0.1.aarch64
systemd-devel-252.4-1161.amzn2023.0.1.aarch64
systemd-resolved-252.4-1161.amzn2023.0.1.aarch64
systemd-libs-252.4-1161.amzn2023.0.1.aarch64
systemd-journal-remote-252.4-1161.amzn2023.0.1.aarch64
systemd-standalone-tmpfiles-252.4-1161.amzn2023.0.1.aarch64
systemd-tests-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-debugsource-252.4-1161.amzn2023.0.1.aarch64
systemd-udev-252.4-1161.amzn2023.0.1.aarch64
systemd-debuginfo-252.4-1161.amzn2023.0.1.aarch64
systemd-252.4-1161.amzn2023.0.1.aarch64
systemd-tests-252.4-1161.amzn2023.0.1.aarch64
noarch:
systemd-oomd-defaults-252.4-1161.amzn2023.0.1.noarch
systemd-rpm-macros-252.4-1161.amzn2023.0.1.noarch
src:
systemd-252.4-1161.amzn2023.0.1.src
x86_64:
systemd-resolved-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-udev-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-sysusers-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-journal-remote-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-networkd-252.4-1161.amzn2023.0.1.x86_64
systemd-networkd-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-libs-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-resolved-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-tmpfiles-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-pam-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-tmpfiles-252.4-1161.amzn2023.0.1.x86_64
systemd-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-devel-252.4-1161.amzn2023.0.1.x86_64
systemd-container-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-standalone-sysusers-252.4-1161.amzn2023.0.1.x86_64
systemd-libs-252.4-1161.amzn2023.0.1.x86_64
systemd-journal-remote-252.4-1161.amzn2023.0.1.x86_64
systemd-container-252.4-1161.amzn2023.0.1.x86_64
systemd-pam-252.4-1161.amzn2023.0.1.x86_64
systemd-udev-252.4-1161.amzn2023.0.1.x86_64
systemd-252.4-1161.amzn2023.0.1.x86_64
systemd-debugsource-252.4-1161.amzn2023.0.1.x86_64
systemd-tests-debuginfo-252.4-1161.amzn2023.0.1.x86_64
systemd-tests-252.4-1161.amzn2023.0.1.x86_64
Amazon Linux AMI: All versions
systemd: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-025.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.