vulnerability
Amazon Linux AMI 2: CVE-2023-3567: Security patch for kernel (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:L/AC:L/Au:S/C:C/I:N/A:C) | Jul 24, 2023 | Oct 4, 2023 | May 1, 2025 |
Severity
6
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:C)
Published
Jul 24, 2023
Added
Oct 4, 2023
Modified
May 1, 2025
Description
A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.
Solution(s)
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-4-14-330-250-540amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-173-154-642amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-184-174-730amazon-linux-ami-2-upgrade-kernel-livepatch-5-15-117-72-142amazon-linux-ami-2-upgrade-kernel-livepatch-5-15-93-55-139amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo
References
- AMAZON-AL2/ALAS-2023-2359
- AMAZON-AL2/ALAS-2025-2834
- AMAZON-AL2/ALASKERNEL-5.10-2023-028
- AMAZON-AL2/ALASKERNEL-5.10-2023-034
- AMAZON-AL2/ALASKERNEL-5.15-2023-014
- AMAZON-AL2/ALASKERNEL-5.15-2023-021
- AMAZON-AL2/ALASKERNEL-5.15-2024-037
- AMAZON-AL2/ALASKERNEL-5.4-2023-043
- AMAZON-AL2/ALASKERNEL-5.4-2023-047
- CVE-2023-3567
- https://attackerkb.com/topics/CVE-2023-3567

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.