Amazon Linux 2023 : bpftool, kernel, kernel-devel (ALAS2023-2023-184)

high Nessus Plugin ID 176925

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2023-184 advisory.

There is a potential deadlock in the eBPF subsystem in the Linux kernel.

The default sysctl configuration kernel.unprivileged_bpf_disabled on Amazon Linux does not allow unprivileged users to use eBPF. (CVE-2023-0160)

A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub- component. (CVE-2023-2269)

In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled. (CVE-2023-32233)

An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. (CVE-2023-34256)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix i_disksize exceeding i_size problem in paritally written case (CVE-2023-53270)

In the Linux kernel, the following vulnerability has been resolved:

ext4: add bounds checking in get_max_inline_xattr_value_size() (CVE-2023-53285)

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix null-ptr-deref on inode->i_op in ntfs_lookup() (CVE-2023-53294)

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix leak of 'r10bio->remaining' for recovery (CVE-2023-53299)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix WARNING in mb_find_extent (CVE-2023-53317)

In the Linux kernel, the following vulnerability has been resolved:

ext4: remove a BUG_ON in ext4_mb_release_group_pa() (CVE-2023-53450)

In the Linux kernel, the following vulnerability has been resolved:

ext4: improve error handling from ext4_dirhash() (CVE-2023-53473)

In the Linux kernel, the following vulnerability has been resolved:

x86/MCE/AMD: Use an u64 for bank_map (CVE-2023-53474)

In the Linux kernel, the following vulnerability has been resolved:

tcp/udp: Fix memleaks of sk and zerocopy skbs with TX timestamp. (CVE-2023-53489)

In the Linux kernel, the following vulnerability has been resolved:

blk-crypto: make blk_crypto_evict_key() more robust (CVE-2023-53536)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Make intel_get_crtc_new_encoder() less oopsy (CVE-2023-53571)

In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix multiple LUN_RESET handling (CVE-2023-53586)

In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Sync IRQ works before buffer destruction (CVE-2023-53587)

In the Linux kernel, the following vulnerability has been resolved:

dm integrity: call kmem_cache_destroy() in dm_integrity_init() error path (CVE-2023-53604)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_fq: fix integer overflow of credit (CVE-2023-53624)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: conntrack: fix wrong ct->timeout value (CVE-2023-53635)

In the Linux kernel, the following vulnerability has been resolved:

x86: fix clear_user_rep_good() exception handling annotation (CVE-2023-53642)

In the Linux kernel, the following vulnerability has been resolved:

rcu: Avoid stack overflow due to __rcu_irq_enter_check_tick() being kprobe-ed (CVE-2023-53655)

In the Linux kernel, the following vulnerability has been resolved:

tcp: fix skb_copy_ubufs() vs BIG TCP (CVE-2023-53669)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix use-after-free read in ext4_find_extent for bigalloc + inline (CVE-2023-53692)

In the Linux kernel, the following vulnerability has been resolved:

x86: fix clear_user_rep_good() exception handling annotation (CVE-2023-53749)

In the Linux kernel, the following vulnerability has been resolved:

cifs: fix potential use-after-free bugs in TCP_Server_Info::hostname (CVE-2023-53751)

In the Linux kernel, the following vulnerability has been resolved:

virt/coco/sev-guest: Double-buffer messages (CVE-2023-53769)

In the Linux kernel, the following vulnerability has been resolved:

dm flakey: fix a crash with invalid table line (CVE-2023-53786)

In the Linux kernel, the following vulnerability has been resolved:

ethtool: Fix uninitialized number of lanes (CVE-2023-53798)

In the Linux kernel, the following vulnerability has been resolved:

blk-mq: release crypto keyslot before reporting I/O complete (CVE-2023-53810)

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix null-ptr-deref in raid10_sync_request (CVE-2023-53832)

In the Linux kernel, the following vulnerability has been resolved:

ceph: fix potential use-after-free bug when trimming caps (CVE-2023-53867)

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix slab-out-of-bounds read in hdr_delete_de() (CVE-2023-53988)

In the Linux kernel, the following vulnerability has been resolved:

SMB3: Add missing locks to protect deferred close file list (CVE-2023-53990)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix assertion of exclop condition when starting balance (CVE-2023-54002)

In the Linux kernel, the following vulnerability has been resolved:

vmci_host: fix a race condition in vmci_host_poll() causing GPF (CVE-2023-54007)

In the Linux kernel, the following vulnerability has been resolved:

spmi: Add a check for remove callback when removing a SPMI driver (CVE-2023-54044)

In the Linux kernel, the following vulnerability has been resolved:

kheaders: Use array declaration instead of char (CVE-2023-54056)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix invalid free tracking in ext4_xattr_move_to_block() (CVE-2023-54062)

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix OOB read in indx_insert_into_buffer (CVE-2023-54063)

In the Linux kernel, the following vulnerability has been resolved:

tpm: Add !tpm_amd_is_rng_defective() to the hwrng_unregister() call site (CVE-2023-54073)

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Fix memory leak if ntfs_read_mft failed (CVE-2023-54077)

In the Linux kernel, the following vulnerability has been resolved:

inotify: Avoid reporting event with invalid wd (CVE-2023-54119)

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak for 'conf->bio_split' (CVE-2023-54123)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't free qgroup space unless specified (CVE-2023-54158)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: cls_api: remove block_cb from driver_list before freeing (CVE-2023-54193)

In the Linux kernel, the following vulnerability has been resolved:

fs/ntfs3: Add check for kmemdup (CVE-2023-54248)

In the Linux kernel, the following vulnerability has been resolved:

md/raid10: fix memleak of md thread (CVE-2023-54294)

In the Linux kernel, the following vulnerability has been resolved:

ext4: fix deadlock when converting an inline directory in nojournal mode (CVE-2023-54311)

A use-after-free flaw was found in the __ext4_remount in fs/ext4/super.c in ext4 in the Linux kernel. This flaw allows a local user to cause an information leak problem while freeing the old quota file names before a potential failure, leading to a use-after-free. (CVE-2024-0775)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel --releasever 2023.0.20230607' or or 'dnf update --advisory ALAS2023-2023-184 --releasever 2023.0.20230607' to update your system.

See Also

https://alas.aws.amazon.com//AL2023/ALAS2023-2023-184.html

https://alas.aws.amazon.com/faqs.html

https://explore.alas.aws.amazon.com/CVE-2023-0160.html

https://explore.alas.aws.amazon.com/CVE-2023-2269.html

https://explore.alas.aws.amazon.com/CVE-2023-32233.html

https://explore.alas.aws.amazon.com/CVE-2023-34256.html

https://explore.alas.aws.amazon.com/CVE-2023-53270.html

https://explore.alas.aws.amazon.com/CVE-2023-53285.html

https://explore.alas.aws.amazon.com/CVE-2023-53294.html

https://explore.alas.aws.amazon.com/CVE-2023-53299.html

https://explore.alas.aws.amazon.com/CVE-2023-53317.html

https://explore.alas.aws.amazon.com/CVE-2023-53450.html

https://explore.alas.aws.amazon.com/CVE-2023-53473.html

https://explore.alas.aws.amazon.com/CVE-2023-53474.html

https://explore.alas.aws.amazon.com/CVE-2023-53489.html

https://explore.alas.aws.amazon.com/CVE-2023-53536.html

https://explore.alas.aws.amazon.com/CVE-2023-53571.html

https://explore.alas.aws.amazon.com/CVE-2023-53586.html

https://explore.alas.aws.amazon.com/CVE-2023-53587.html

https://explore.alas.aws.amazon.com/CVE-2023-53604.html

https://explore.alas.aws.amazon.com/CVE-2023-53624.html

https://explore.alas.aws.amazon.com/CVE-2023-53635.html

https://explore.alas.aws.amazon.com/CVE-2023-53642.html

https://explore.alas.aws.amazon.com/CVE-2023-53655.html

https://explore.alas.aws.amazon.com/CVE-2023-53669.html

https://explore.alas.aws.amazon.com/CVE-2023-53692.html

https://explore.alas.aws.amazon.com/CVE-2023-53749.html

https://explore.alas.aws.amazon.com/CVE-2023-53751.html

https://explore.alas.aws.amazon.com/CVE-2023-53769.html

https://explore.alas.aws.amazon.com/CVE-2023-53786.html

https://explore.alas.aws.amazon.com/CVE-2023-53798.html

https://explore.alas.aws.amazon.com/CVE-2023-53810.html

https://explore.alas.aws.amazon.com/CVE-2023-53832.html

https://explore.alas.aws.amazon.com/CVE-2023-53867.html

https://explore.alas.aws.amazon.com/CVE-2023-53988.html

https://explore.alas.aws.amazon.com/CVE-2023-53990.html

https://explore.alas.aws.amazon.com/CVE-2023-54002.html

https://explore.alas.aws.amazon.com/CVE-2023-54007.html

https://explore.alas.aws.amazon.com/CVE-2023-54044.html

https://explore.alas.aws.amazon.com/CVE-2023-54056.html

https://explore.alas.aws.amazon.com/CVE-2023-54062.html

https://explore.alas.aws.amazon.com/CVE-2023-54063.html

https://explore.alas.aws.amazon.com/CVE-2023-54073.html

https://explore.alas.aws.amazon.com/CVE-2023-54077.html

https://explore.alas.aws.amazon.com/CVE-2023-54119.html

https://explore.alas.aws.amazon.com/CVE-2023-54123.html

https://explore.alas.aws.amazon.com/CVE-2023-54158.html

https://explore.alas.aws.amazon.com/CVE-2023-54193.html

https://explore.alas.aws.amazon.com/CVE-2023-54248.html

https://explore.alas.aws.amazon.com/CVE-2023-54294.html

https://explore.alas.aws.amazon.com/CVE-2023-54311.html

https://explore.alas.aws.amazon.com/CVE-2024-0775.html

Plugin Details

Severity: High

ID: 176925

File Name: al2023_ALAS2023-2023-184.nasl

Version: 1.25

Type: local

Agent: unix

Published: 6/8/2023

Updated: 2/12/2026

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-53604

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-tools-devel, p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-libbpf-static, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.29-47.49, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/25/2023

Vulnerability Publication Date: 4/25/2023

Reference Information

CVE: CVE-2023-0160, CVE-2023-2269, CVE-2023-32233, CVE-2023-34256, CVE-2023-53270, CVE-2023-53285, CVE-2023-53294, CVE-2023-53299, CVE-2023-53317, CVE-2023-53450, CVE-2023-53473, CVE-2023-53474, CVE-2023-53489, CVE-2023-53536, CVE-2023-53571, CVE-2023-53586, CVE-2023-53587, CVE-2023-53604, CVE-2023-53624, CVE-2023-53635, CVE-2023-53642, CVE-2023-53655, CVE-2023-53669, CVE-2023-53692, CVE-2023-53751, CVE-2023-53769, CVE-2023-53786, CVE-2023-53798, CVE-2023-53810, CVE-2023-53832, CVE-2023-53867, CVE-2023-53988, CVE-2023-53990, CVE-2023-54002, CVE-2023-54007, CVE-2023-54044, CVE-2023-54056, CVE-2023-54062, CVE-2023-54063, CVE-2023-54073, CVE-2023-54077, CVE-2023-54119, CVE-2023-54123, CVE-2023-54158, CVE-2023-54193, CVE-2023-54248, CVE-2023-54294, CVE-2023-54311, CVE-2024-0775