Amazon Linux AMI update for linux-firmware



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2023-20593
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

linux-firmware
Operating systems & Components / Operating system package or component

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU78572

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2023-20593

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in AMD Zen2 processors. A local user can trigger a use-after-free error and execute arbitrary code on the system.

Note, the vulnerability was dubbed Zenbleed.

Mitigation

Update the affected packages:

noarch:
    liquidio-firmware-20210208-117.amzn2023.0.4.noarch
    iwl7260-firmware-25.30.13.0-117.amzn2023.0.4.noarch
    netronome-firmware-20210208-117.amzn2023.0.4.noarch
    linux-firmware-20210208-117.amzn2023.0.4.noarch
    iwl3160-firmware-25.30.13.0-117.amzn2023.0.4.noarch
    iwl5000-firmware-8.83.5.1_1-117.amzn2023.0.4.noarch
    iwl6000g2b-firmware-18.168.6.1-117.amzn2023.0.4.noarch
    iwl6000g2a-firmware-18.168.6.1-117.amzn2023.0.4.noarch
    libertas-sd8787-firmware-20210208-117.amzn2023.0.4.noarch
    iwl6050-firmware-41.28.5.1-117.amzn2023.0.4.noarch
    iwl1000-firmware-39.31.5.1-117.amzn2023.0.4.noarch
    iwl2030-firmware-18.168.6.1-117.amzn2023.0.4.noarch
    iwl135-firmware-18.168.6.1-117.amzn2023.0.4.noarch
    iwl2000-firmware-18.168.6.1-117.amzn2023.0.4.noarch
    iwl105-firmware-18.168.6.1-117.amzn2023.0.4.noarch
    linux-firmware-whence-20210208-117.amzn2023.0.4.noarch
    iwl6000-firmware-9.221.4.1-117.amzn2023.0.4.noarch
    iwl100-firmware-39.31.5.1-117.amzn2023.0.4.noarch
    iwl5150-firmware-8.24.2.2-117.amzn2023.0.4.noarch
    libertas-sd8686-firmware-20210208-117.amzn2023.0.4.noarch
    libertas-usb8388-firmware-20210208-117.amzn2023.0.4.noarch
    libertas-usb8388-olpc-firmware-20210208-117.amzn2023.0.4.noarch
    iwl4965-firmware-228.61.2.24-117.amzn2023.0.4.noarch
    iwl3945-firmware-15.32.2.9-117.amzn2023.0.4.noarch

src:
    linux-firmware-20210208-117.amzn2023.0.4.src

Vulnerable software versions

Amazon Linux AMI: All versions

linux-firmware: All versions

CPE2.3 External links

https://alas.aws.amazon.com/AL2023/ALAS-2023-284.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###