Amazon Linux 2023 : bpftool, kernel, kernel-devel (ALAS2023-2023-127)

high Nessus Plugin ID 173158

Synopsis

The remote Amazon Linux 2023 host is missing a security update.

Description

It is, therefore, affected by multiple vulnerabilities as referenced in the ALAS2023-2023-127 advisory.

2024-12-05: CVE-2023-52702 was added to this advisory.

2024-12-05: CVE-2023-52704 was added to this advisory.

2024-12-05: CVE-2023-52737 was added to this advisory.

2024-11-13: CVE-2023-52735 was added to this advisory.

2024-08-01: CVE-2023-52646 was added to this advisory.

2024-06-19: CVE-2023-52707 was added to this advisory.

2023-07-05: CVE-2023-1281 was added to this advisory.

A regression exists in the Linux Kernel within KVM: nVMX that allowed for speculative execution attacks.
L2 can carry out Spectre v2 attacks on L1 due to L1 thinking it doesn't need retpolines or IBPB after running L2 due to KVM (L0) advertising eIBRS support to L1. An attacker at L2 with code execution can execute code on an indirect branch on the host machine. We recommend upgrading to Kernel 6.2 or past commit 2e7eab81425a (CVE-2022-2196)

Detected a few exploitable gadgets that could leak secret memory through a side-channel such as MDS as well as insufficient hardening of the usercopy functions against spectre-v1. (CVE-2023-0458)

Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use- after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2. (CVE-2023-1281)

In the Linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device. (CVE-2023-26545)

In the Linux kernel, the following vulnerability has been resolved:

aio: fix mremap after fork null-deref (CVE-2023-52646)

In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix possible memory leak in ovs_meter_cmd_set() (CVE-2023-52702)

In the Linux kernel, the following vulnerability has been resolved:

freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL (CVE-2023-52704)

In the Linux kernel, the following vulnerability has been resolved:

sched/psi: Fix use-after-free in ep_remove_wait_queue() (CVE-2023-52707)

In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Don't let sock_map_{close,destroy,unhash} call itself (CVE-2023-52735)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: lock the inode in shared mode before starting fiemap (CVE-2023-52737)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Run 'dnf update kernel --releasever=2023.0.20230315' to update your system.

See Also

https://alas.aws.amazon.com/AL2023/ALAS-2023-127.html

https://alas.aws.amazon.com/faqs.html

https://alas.aws.amazon.com/cve/html/CVE-2022-2196.html

https://alas.aws.amazon.com/cve/html/CVE-2023-0458.html

https://alas.aws.amazon.com/cve/html/CVE-2023-1281.html

https://alas.aws.amazon.com/cve/html/CVE-2023-26545.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52646.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52702.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52704.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52707.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52735.html

https://alas.aws.amazon.com/cve/html/CVE-2023-52737.html

Plugin Details

Severity: High

ID: 173158

File Name: al2023_ALAS2023-2023-127.nasl

Version: 1.6

Type: local

Agent: unix

Published: 3/21/2023

Updated: 12/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:L/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-1281

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2022-2196

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-aarch64, p-cpe:/a:amazon:linux:kernel-tools, p-cpe:/a:amazon:linux:python3-perf, p-cpe:/a:amazon:linux:kernel-livepatch-6.1.15-28.43, p-cpe:/a:amazon:linux:kernel-libbpf-static, p-cpe:/a:amazon:linux:kernel-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf, p-cpe:/a:amazon:linux:bpftool-debuginfo, p-cpe:/a:amazon:linux:kernel-libbpf-devel, p-cpe:/a:amazon:linux:kernel-headers, p-cpe:/a:amazon:linux:kernel-tools-devel, cpe:/o:amazon:linux:2023, p-cpe:/a:amazon:linux:perf, p-cpe:/a:amazon:linux:bpftool, p-cpe:/a:amazon:linux:kernel-tools-debuginfo, p-cpe:/a:amazon:linux:kernel-devel, p-cpe:/a:amazon:linux:kernel, p-cpe:/a:amazon:linux:python3-perf-debuginfo, p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 3/11/2023

Vulnerability Publication Date: 1/9/2023

Reference Information

CVE: CVE-2022-2196, CVE-2023-0458, CVE-2023-1281, CVE-2023-26545, CVE-2023-52646, CVE-2023-52702, CVE-2023-52704, CVE-2023-52707, CVE-2023-52735, CVE-2023-52737