Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 9 |
CVE-ID | CVE-2023-34324 CVE-2023-39191 CVE-2023-52476 CVE-2023-52477 CVE-2023-52481 CVE-2023-52522 CVE-2023-52523 CVE-2023-52559 CVE-2024-0641 |
CWE-ID | CWE-833 CWE-20 CWE-125 CWE-908 CWE-200 CWE-399 CWE-476 CWE-667 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Amazon Linux AMI Operating systems & Components / Operating system kernel Operating systems & Components / Operating system package or component |
Vendor | Amazon Web Services |
Security Bulletin
This security bulletin contains information about 9 vulnerabilities.
EUVDB-ID: #VU81900
Risk: Medium
CVSSv4.0: 4.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2023-34324
CWE-ID:
CWE-833 - Deadlock
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to perform a denial of service (DoS) attack.
The vulnerability exists due to improper event handling in Linux kernel. A malicious guest can disable paravirtualized device to cause a deadlock in a backend domain (other than dom0).
Update the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU82763
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-39191
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the eBPF subsystem in the Linux kernel. A local user with CAP_BPF capability can execute arbitrary code with elevated privileges.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88821
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52476
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary condition within the branch_type() and get_branch_type() functions in arch/x86/events/utils.c. A local user can trigger an out-of-bounds read error and crash the kernel.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89393
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52477
CWE-ID:
CWE-908 - Use of Uninitialized Resource
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to usage of uninitialized BOS descriptors in drivers/usb/core/hub.c. A local user can perform a denial of service (DoS) attack.
Update the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU91368
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52481
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to information disclosure within the ERRATA_MIDR_REV_RANGE() function in arch/arm64/kernel/cpu_errata.c. A local user can gain access to sensitive information.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU89387
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52522
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the neigh_periodic_work() function in net/core/neighbour.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU90635
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52523
CWE-ID:
CWE-476 - NULL Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the BPF_CALL_4() function in net/core/sock_map.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU93208
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-52559
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to resource management error within the iommu_suspend() and iommu_resume() functions in drivers/iommu/intel/iommu.c. A local user can perform a denial of service (DoS) attack.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU86245
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-0641
CWE-ID:
CWE-667 - Improper Locking
Exploit availability: No
DescriptionThe vulnerability allows a malicious guest to perform a denial of service attack (DoS) on the target system.
The vulnerability exists due to double-locking error within the tipc_crypto_key_revoke() function in net/tipc/crypto.c. A malicious guest can exploit this vulnerability to cause a deadlock, resulting in a denial of service.
MitigationUpdate the affected packages:
aarch64:Vulnerable software versions
kernel-tools-6.1.59-84.139.amzn2023.aarch64
kernel-modules-extra-6.1.59-84.139.amzn2023.aarch64
bpftool-6.1.59-84.139.amzn2023.aarch64
python3-perf-6.1.59-84.139.amzn2023.aarch64
perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.aarch64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-6.1.59-84.139.amzn2023.aarch64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-headers-6.1.59-84.139.amzn2023.aarch64
python3-perf-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-libbpf-static-6.1.59-84.139.amzn2023.aarch64
kernel-tools-devel-6.1.59-84.139.amzn2023.aarch64
perf-6.1.59-84.139.amzn2023.aarch64
bpftool-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-6.1.59-84.139.amzn2023.aarch64
kernel-debuginfo-common-aarch64-6.1.59-84.139.amzn2023.aarch64
kernel-devel-6.1.59-84.139.amzn2023.aarch64
src:
kernel-6.1.59-84.139.amzn2023.src
x86_64:
python3-perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-tools-devel-6.1.59-84.139.amzn2023.x86_64
bpftool-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-devel-6.1.59-84.139.amzn2023.x86_64
kernel-tools-6.1.59-84.139.amzn2023.x86_64
kernel-tools-debuginfo-6.1.59-84.139.amzn2023.x86_64
python3-perf-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-6.1.59-84.139.amzn2023.x86_64
kernel-livepatch-6.1.59-84.139-1.0-0.amzn2023.x86_64
perf-debuginfo-6.1.59-84.139.amzn2023.x86_64
bpftool-6.1.59-84.139.amzn2023.x86_64
kernel-libbpf-static-6.1.59-84.139.amzn2023.x86_64
perf-6.1.59-84.139.amzn2023.x86_64
kernel-modules-extra-6.1.59-84.139.amzn2023.x86_64
kernel-headers-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-6.1.59-84.139.amzn2023.x86_64
kernel-6.1.59-84.139.amzn2023.x86_64
kernel-debuginfo-common-x86_64-6.1.59-84.139.amzn2023.x86_64
kernel-devel-6.1.59-84.139.amzn2023.x86_64
Amazon Linux AMI: All versions
kernel: All versions
CPE2.3https://alas.aws.amazon.com/AL2023/ALAS-2023-422.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.