ALAS2LIVEPATCH-2023-125

Related Vulnerabilities: CVE-2022-4379   CVE-2023-32233  

A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service. (CVE-2022-4379) In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. (CVE-2023-32233)

ALAS2LIVEPATCH-2023-125


Amazon Linux 2 Security Advisory: ALASLIVEPATCH-2023-125
Advisory Release Date: 2023-05-25 17:42 Pacific
Advisory Updated Date: 2023-06-05 17:57 Pacific
Severity: Important

Issue Overview:

A use-after-free vulnerability was found in __nfs42_ssc_open() in fs/nfs/nfs4file.c in the Linux kernel. This flaw allows an attacker to conduct a remote denial of service. (CVE-2022-4379)

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. (CVE-2023-32233)


Affected Packages:

kernel-livepatch-5.10.176-157.645


Issue Correction:
Please ensure you have live patching enabled.
Run yum update kernel-livepatch-5.10.176-157.645 to update your system.

New Packages:
aarch64:
    kernel-livepatch-5.10.176-157.645-1.0-1.amzn2.aarch64
    kernel-livepatch-5.10.176-157.645-debuginfo-1.0-1.amzn2.aarch64

src:
    kernel-livepatch-5.10.176-157.645-1.0-1.amzn2.src

x86_64:
    kernel-livepatch-5.10.176-157.645-1.0-1.amzn2.x86_64
    kernel-livepatch-5.10.176-157.645-debuginfo-1.0-1.amzn2.x86_64