QID 355199

Date Published: 2023-05-29

QID 355199: Amazon Linux Security Advisory for kernel : ALAS2023-2023-070

2023-05-11:( CVE-2023-2019 was added to this advisory. a flaw was found in the linux kernels netdevsim device driver, within the scheduling of events.
This issue results from the improper management of a reference count.
This may allow an attacker to create a denial of service condition on the system. (
( CVE-2023-2019) amd recommends using a software mitigation for this issue, which the kernel is enabling by default.
The linux kernel will use the generic retpoline software mitigation, instead of the specialized amd one, on amd instances (*5a*).
This is done by default, and no administrator action is needed. (
( CVE-2021-26341) amd recommends using a software mitigation for this issue, which the kernel is enabling by default.
( CVE-2021-26401) non-transparent sharing of branch predictor selectors between contexts in some intel(r) processors may allow an authorized user to potentially enable information disclosure. (
( CVE-2022-0001) non-transparent sharing of branch predictor within a context in some intel(r) processors may allow an authorized user to potentially enable information disclosure via local access. (
( CVE-2022-0002) a flaw was found in the linux kernel.
The existing kvm sev api has a vulnerability that allows a non-root (host) user-level application to crash the host kernel by creating a confidential guest vm instance in amd cpu that supports secure encrypted virtualization (sev).

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023-2023-070 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 355199

    CVE-2022-39189 | CVE-2022-30594 | CVE-2023-0459 | CVE-2022-39842 | CVE-2022-21505 | CVE-2022-2586 | CVE-2022-29901 | CVE-2022-34495 | CVE-2022-3534 | CVE-2023-0179 | CVE-2022-28693 | CVE-2022-0001 | CVE-2022-24958 | CVE-2022-23222 | CVE-2022-0002 | CVE-2022-39188 | CVE-2022-1353 | CVE-2022-1158 | CVE-2022-36123 | CVE-2022-3522 | CVE-2022-32250 | CVE-2022-25636 | CVE-2022-2585 | CVE-2022-29156 | CVE-2022-40307 | CVE-2022-3523 | CVE-2022-1055 | CVE-2022-3566 | CVE-2022-42328 | CVE-2022-3623 | CVE-2022-1263 | CVE-2022-45869 | CVE-2022-2588 | CVE-2022-2663 | CVE-2022-29582 | CVE-2022-33742 | CVE-2022-3643 | CVE-2022-32981 | CVE-2022-4379 | CVE-2022-0854 | CVE-2022-3176 | CVE-2023-0469 | CVE-2022-23816 | CVE-2022-2905 | CVE-2022-27223 | CVE-2022-39190 | CVE-2022-0492 | CVE-2021-26341 | CVE-2022-1462 | CVE-2022-43750 | CVE-2022-3303 | CVE-2022-1016 | CVE-2022-0847 | CVE-2022-3543 | CVE-2022-26373 | CVE-2022-1972 | CVE-2022-23960 | CVE-2022-1973 | CVE-2022-21166 | CVE-2022-0742 | CVE-2022-34918 | CVE-2023-0394 | CVE-2022-33740 | CVE-2022-1966 | CVE-2022-3606 | CVE-2022-29900 | CVE-2022-33741 | CVE-2022-3435 | CVE-2023-2177 | CVE-2022-21123 | CVE-2022-3567 | CVE-2022-0500 | CVE-2022-3524 | CVE-2022-3061 | CVE-2022-1729 | CVE-2022-1679 | CVE-2022-4139 | CVE-2022-33743 | CVE-2022-26365 | CVE-2022-1199 | CVE-2022-2602 | CVE-2022-1789 | CVE-2023-2019 | CVE-2022-4378 | CVE-2022-2078 | CVE-2022-21125 | CVE-2022-4842 | CVE-2022-3028 | CVE-2022-0494 | CVE-2022-23825 | CVE-2022-43945 | CVE-2022-36879 | CVE-2021-26401 | CVE-2022-34494 | CVE-2022-0171 | CVE-2022-1852 | CVE-2022-0185 | CVE-2022-36946 | CVE-2022-29581 | CVE-2022-28893 | CVE-2023-0590 | CVE-2022-1015 | CVE-2022-1184 | CVE-2022-42329 |
    Software Advisories
    Advisory ID Software Component Link
    ALAS2023-2023-070 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALAS-2023-070.html