Lucene search

K
amazonAmazonALAS-2023-1735
HistoryApr 27, 2023 - 4:19 p.m.

Important: kernel

2023-04-2716:19:00
alas.aws.amazon.com
55
linux kernel
race condition
use-after-free
out-of-bounds
memory access
type confusion
dos
system crash
kernel info leak
privilege escalation

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

25.4%

Issue Overview:

2023-06-29: CVE-2023-33203 was added to this advisory.

2023-06-07: CVE-2023-1838 was added to this advisory.

The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device. (CVE-2023-33203)

A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. (CVE-2023-1838)

An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2023-2124)

cbq_classify in net/sched/sch_cbq.c in the Linux kernel through 6.1.4 allows attackers to cause a denial of service (slab-out-of-bounds read) because of type confusion (non-negative numbers can sometimes indicate a TC_ACT_SHOT condition rather than valid classification results). (CVE-2023-23454)

Affected Packages:

kernel

Issue Correction:
Run yum update kernel to update your system.

New Packages:

i686:  
    kernel-debuginfo-common-i686-4.14.313-162.533.amzn1.i686  
    kernel-tools-debuginfo-4.14.313-162.533.amzn1.i686  
    kernel-devel-4.14.313-162.533.amzn1.i686  
    perf-debuginfo-4.14.313-162.533.amzn1.i686  
    kernel-headers-4.14.313-162.533.amzn1.i686  
    perf-4.14.313-162.533.amzn1.i686  
    kernel-4.14.313-162.533.amzn1.i686  
    kernel-tools-4.14.313-162.533.amzn1.i686  
    kernel-debuginfo-4.14.313-162.533.amzn1.i686  
    kernel-tools-devel-4.14.313-162.533.amzn1.i686  
  
src:  
    kernel-4.14.313-162.533.amzn1.src  
  
x86_64:  
    kernel-tools-debuginfo-4.14.313-162.533.amzn1.x86_64  
    kernel-4.14.313-162.533.amzn1.x86_64  
    kernel-tools-devel-4.14.313-162.533.amzn1.x86_64  
    kernel-debuginfo-common-x86_64-4.14.313-162.533.amzn1.x86_64  
    perf-4.14.313-162.533.amzn1.x86_64  
    kernel-headers-4.14.313-162.533.amzn1.x86_64  
    kernel-debuginfo-4.14.313-162.533.amzn1.x86_64  
    kernel-tools-4.14.313-162.533.amzn1.x86_64  
    kernel-devel-4.14.313-162.533.amzn1.x86_64  
    perf-debuginfo-4.14.313-162.533.amzn1.x86_64  

Additional References

Red Hat: CVE-2023-1838, CVE-2023-2124, CVE-2023-23454, CVE-2023-33203

Mitre: CVE-2023-1838, CVE-2023-2124, CVE-2023-23454, CVE-2023-33203

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

25.4%