ALAS2KERNEL-5.15-2023-026

Related Vulnerabilities: CVE-2022-40982   CVE-2023-20588   CVE-2023-34319   CVE-2023-4004   CVE-2023-4128   CVE-2023-4147  

A Gather Data Sampling (GDS) transient execution side-channel vulnerability was found affecting certain Intel processors. This issue may allow a local attacker using gather instruction (load from memory) to infer stale data from previously used vector registers on the same physical core. (CVE-2022-40982) A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. (CVE-2023-20588) A buffer overrun vulnerability was found in the netback driver in Xen due to an unusual split packet. This flaw allows an unprivileged guest to cause a denial of service (DoS) of the host by sending network packets to the backend, causing the backend to crash. (CVE-2023-34319) A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system. (CVE-2023-4004) A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue. (CVE-2023-4128) netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID (CVE-2023-4147)

ALAS2KERNEL-5.15-2023-026


Amazon Linux 2 Security Advisory: ALASKERNEL-5.15-2023-026
Advisory Release Date: 2023-08-31 22:46 Pacific
Advisory Updated Date: 2023-09-06 20:30 Pacific
Severity: Important

Issue Overview:

A Gather Data Sampling (GDS) transient execution side-channel vulnerability was found affecting certain Intel processors. This issue may allow a local attacker using gather instruction (load from memory) to infer stale data from previously used vector registers on the same physical core. (CVE-2022-40982)

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. (CVE-2023-20588)

A buffer overrun vulnerability was found in the netback driver in Xen due to an unusual split packet. This flaw allows an unprivileged guest to cause a denial of service (DoS) of the host by sending network packets to the backend, causing the backend to crash. (CVE-2023-34319)

A use-after-free flaw was found in the Linux kernel's netfilter in the way a user triggers the nft_pipapo_remove function with the element, without a NFT_SET_EXT_KEY_END. This issue could allow a local user to crash the system or potentially escalate their privileges on the system. (CVE-2023-4004)

A use-after-free flaw was found in net/sched/cls_fw.c in classifiers (cls_fw, cls_u32, and cls_route) in the Linux Kernel. This flaw allows a local attacker to perform a local privilege escalation due to incorrect handling of the existing filter, leading to a kernel information leak issue. (CVE-2023-4128)

netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID (CVE-2023-4147)


Affected Packages:

kernel


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.15.128-80.144.amzn2.aarch64
    kernel-headers-5.15.128-80.144.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.15.128-80.144.amzn2.aarch64
    perf-5.15.128-80.144.amzn2.aarch64
    perf-debuginfo-5.15.128-80.144.amzn2.aarch64
    python-perf-5.15.128-80.144.amzn2.aarch64
    python-perf-debuginfo-5.15.128-80.144.amzn2.aarch64
    kernel-tools-5.15.128-80.144.amzn2.aarch64
    kernel-tools-devel-5.15.128-80.144.amzn2.aarch64
    kernel-tools-debuginfo-5.15.128-80.144.amzn2.aarch64
    bpftool-5.15.128-80.144.amzn2.aarch64
    bpftool-debuginfo-5.15.128-80.144.amzn2.aarch64
    kernel-devel-5.15.128-80.144.amzn2.aarch64
    kernel-debuginfo-5.15.128-80.144.amzn2.aarch64
    kernel-livepatch-5.15.128-80.144-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.15.128-80.144.amzn2.i686

src:
    kernel-5.15.128-80.144.amzn2.src

x86_64:
    kernel-5.15.128-80.144.amzn2.x86_64
    kernel-headers-5.15.128-80.144.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.15.128-80.144.amzn2.x86_64
    perf-5.15.128-80.144.amzn2.x86_64
    perf-debuginfo-5.15.128-80.144.amzn2.x86_64
    python-perf-5.15.128-80.144.amzn2.x86_64
    python-perf-debuginfo-5.15.128-80.144.amzn2.x86_64
    kernel-tools-5.15.128-80.144.amzn2.x86_64
    kernel-tools-devel-5.15.128-80.144.amzn2.x86_64
    kernel-tools-debuginfo-5.15.128-80.144.amzn2.x86_64
    bpftool-5.15.128-80.144.amzn2.x86_64
    bpftool-debuginfo-5.15.128-80.144.amzn2.x86_64
    kernel-devel-5.15.128-80.144.amzn2.x86_64
    kernel-debuginfo-5.15.128-80.144.amzn2.x86_64
    kernel-livepatch-5.15.128-80.144-1.0-0.amzn2.x86_64