Sensitive Information Uncleared Before Release Affecting kernel package, versions <0:4.14.276-211.499.amzn2


Severity

Recommended
high

Based on Amazon Linux security rating.

Threat Intelligence

EPSS
0.04% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-AMZN2-KERNEL-7364758
  • published25 Jun 2024
  • disclosed27 Mar 2023

Introduced: 27 Mar 2023

CVE-2023-1637  (opens in a new tab)
CWE-226  (opens in a new tab)
CWE-385  (opens in a new tab)
CWE-200  (opens in a new tab)
First added by Snyk

How to fix?

Upgrade Amazon-Linux:2 kernel to version 0:4.14.276-211.499.amzn2 or higher.
This issue was patched in ALAS2-2024-2569.

NVD Description

Note: Versions mentioned in the description apply only to the upstream kernel package and not the kernel package as distributed by Amazon-Linux. See How to fix? for Amazon-Linux:2 relevant fixed versions and status.

A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.

CVSS Scores

version 3.1