QID 357057

Date Published: 2024-01-25

QID 357057: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2024-035

an issue was discovered in the linux kernel through 6.5.9.
During a race with sq thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo null pointer dereference can occur. (
( CVE-2023-46862) an out-of-bounds read vulnerability was found in the nvme-of/tcp subsystem in the linux kernel.
This flaw allows a remote attacker to send a crafted tcp packet, triggering a heap-based buffer overflow that results in kmalloc data to be printed (and potentially leaked) to the kernel ring buffer (dmesg). (
( CVE-2023-6121) a null pointer dereference vulnerability was found in nft_dynset_init() in net/netfilter/nft_dynset.c in nf_tables in the linux kernel.
This issue may allow a local attacker with cap_net_admin user privilege to trigger a denial of service. (
( CVE-2023-6622) a use-after-free vulnerability in the linux kernels netfilter: nf_tables component can be exploited to achieve local privilege escalation. the function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of pipapo (pile packet policies) elements, leading to use-after-free. we recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a. (
( CVE-2023-6817) a heap out-of-bounds write vulnerability in the linux kernels performance events system component can be exploited to achieve local privilege escalation. a perf_events read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). we recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b. (

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2KERNEL-5.15-2024-035 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2KERNEL-5.15-2024-035 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2024-035.html