| Risk | Medium |
| Patch available | YES |
| Number of vulnerabilities | 18 |
| CVE-ID | CVE-2023-20588 CVE-2023-34319 CVE-2023-3772 CVE-2023-3773 CVE-2023-3777 CVE-2023-39194 CVE-2023-4004 CVE-2023-4015 CVE-2023-4128 CVE-2023-4147 CVE-2023-4194 CVE-2023-4206 CVE-2023-4207 CVE-2023-4208 CVE-2023-4273 CVE-2023-4569 CVE-2023-4622 CVE-2023-1076 |
| CWE-ID | CWE-369 CWE-119 CWE-476 CWE-125 CWE-399 CWE-416 CWE-843 CWE-121 CWE-401 |
| Exploitation vector | Network |
| Public exploit |
Public exploit code for vulnerability #7 is available. Public exploit code for vulnerability #10 is available. |
| Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system kernel Operating systems & Components / Operating system package or component |
| Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 18 vulnerabilities.
EUVDB-ID: #VU79239
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-20588
CWE-ID:
CWE-369 - Divide By Zero
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to a divide by zero error that can return speculative data. A local user can gain access to potentially sensitive information.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79260
Risk: Medium
CVSSv4.0: 5.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/U:Green]
CVE-ID: CVE-2023-34319
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in netback when processing certain packets. A malicious guest can send specially crafted packets to the backend, trigger memory corruption and crash the hypervisor.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80578
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3772
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a NULL pointer dereference error within the xfrm_update_ae_params() function in the IP framework for transforming packets (XFRM subsystem). A local user with CAP_NET_ADMIN privileges can perform a denial of service (DoS) attack.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80579
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3773
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in IP framework for transforming packets (XFRM subsystem). A local user with CAP_NET_ADMIN privileges can cause a 4 byte out-of-bounds read of XFRMA_MTIMER_THRESH when parsing netlink attributes and gain access to sensitive information.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80121
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-3777
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper handling of table rules flush in certain circumstances within the netfilter subsystem in net/netfilter/nf_tables_api.c. A local user can perform a denial of service (DoS) attack or execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU81919
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39194
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition within the XFRM subsystem in Linux kernel. A local user with CAP_NET_ADMIN capability can trigger an out-of-bounds read error and read contents of memory on the system.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79498
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-4004
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. A local user can execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU80123
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4015
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error within the netfilter subsystem in net/netfilter/nft_immediate.c when handling bound chain deactivation. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79486
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4128
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79713
Risk: Low
CVSSv4.0: 7.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]
CVE-ID: CVE-2023-4147
CWE-ID:
CWE-416 - Use After Free
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in Netfilter functionality when adding a rule with NFTA_RULE_CHAIN_ID. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.
EUVDB-ID: #VU79485
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4194
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a type confusion error in TUN/TAP functionality. A local user can bypass network filters and gain unauthorized access to some resources.
The vulnerability exists due to incomplete fix for #VU72742 (CVE-2023-1076).
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80580
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4206
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the cls_route component in Linux kernel packet scheduler. A local user can trigger a use-after-free error and execute arbitrary code on the system.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80587
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4207
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the cls_fw component in Linux kernel packet scheduler. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80586
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4208
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the the cls_u32 component in Linux kernel packet scheduler. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU79487
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4273
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the implementation of the file name reconstruction function in the exFAT driver in Linux kernel. A local user can trigger a stack overflow and execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80584
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4569
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform DoS attack on the target system.
The vulnerability exists due memory leak within the nft_set_catchall_flush() function in net/netfilter/nf_tables_api.c. A local user can perform a denial of service attack.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU80583
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-4622
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the unix_stream_sendpage() function in af_unix component. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU72742
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-1076
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a type confusion error during initialization of TUN/TAP sockets. A local user can trigger a type confusion error and execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-libbpf-devel-6.1.49-69.116.amzn2023.aarch64
python3-perf-6.1.49-69.116.amzn2023.aarch64
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.aarch64
bpftool-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-headers-6.1.49-69.116.amzn2023.aarch64
bpftool-6.1.49-69.116.amzn2023.aarch64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-6.1.49-69.116.amzn2023.aarch64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
perf-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-tools-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-6.1.49-69.116.amzn2023.aarch64
kernel-tools-devel-6.1.49-69.116.amzn2023.aarch64
kernel-libbpf-static-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-6.1.49-69.116.amzn2023.aarch64
kernel-6.1.49-69.116.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.49-69.116.amzn2023.aarch64
kernel-devel-6.1.49-69.116.amzn2023.aarch64
src:
kernel-6.1.49-69.116.amzn2023.src
x86_64:
kernel-livepatch-6.1.49-69.116-1.0-0.amzn2023.x86_64
perf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-devel-6.1.49-69.116.amzn2023.x86_64
perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-tools-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-static-6.1.49-69.116.amzn2023.x86_64
kernel-headers-6.1.49-69.116.amzn2023.x86_64
python3-perf-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-devel-6.1.49-69.116.amzn2023.x86_64
bpftool-debuginfo-6.1.49-69.116.amzn2023.x86_64
python3-perf-6.1.49-69.116.amzn2023.x86_64
bpftool-6.1.49-69.116.amzn2023.x86_64
kernel-libbpf-6.1.49-69.116.amzn2023.x86_64
kernel-tools-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-6.1.49-69.116.amzn2023.x86_64
kernel-6.1.49-69.116.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.49-69.116.amzn2023.x86_64
kernel-devel-6.1.49-69.116.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: before 6.1.49-69.116
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-330.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.