vulnerability
Amazon Linux AMI 2: CVE-2023-32233: Security patch for kernel, kernel-livepatch-5.10.167-147.601, kernel-livepatch-5.10.173-154.642, kernel-livepatch-5.10.176-157.645, kernel-livepatch-5.10.177-158.645, kernel-livepatch-5.10.178-162.673, kernel-livepatch-5.10.179-166.674 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | May 8, 2023 | Jun 6, 2023 | Jan 28, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
May 8, 2023
Added
Jun 6, 2023
Modified
Jan 28, 2025
Description
In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.
Solution(s)
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-314-238-539amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-167-147-601amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-167-147-601-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-173-154-642amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-173-154-642-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-176-157-645amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-176-157-645-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-177-158-645amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-177-158-645-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-178-162-673amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-178-162-673-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-179-166-674amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-179-166-674-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-179-168-710amazon-linux-ami-2-upgrade-kernel-livepatch-5-15-110-70-143amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
References
- AMAZON-AL2/ALAS-2023-2050
- AMAZON-AL2/ALASKERNEL-5.10-2023-033
- AMAZON-AL2/ALASKERNEL-5.15-2023-020
- AMAZON-AL2/ALASKERNEL-5.4-2023-046
- AMAZON-AL2/ALASLIVEPATCH-2023-122
- AMAZON-AL2/ALASLIVEPATCH-2023-123
- AMAZON-AL2/ALASLIVEPATCH-2023-124
- AMAZON-AL2/ALASLIVEPATCH-2023-125
- AMAZON-AL2/ALASLIVEPATCH-2023-126
- AMAZON-AL2/ALASLIVEPATCH-2023-127
- CVE-2023-32233
- https://attackerkb.com/topics/CVE-2023-32233

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.