[ALAS2-2023-2238] Amazon Linux 2 2017.12 - ALAS2-2023-2238: important priority package update for amazon-ssm-agent
Package updates are available for Amazon Linux 2 that fix the following vulnerabilities:
CVE-2022-41723:
http2/hpack: avoid quadratic complexity in hpack decoding
CVE-2022-27664:
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
CVE-2022-27191:
A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentification with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability.
CVE-2021-43565:
The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an attacker to panic an SSH server.
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/amazon-ssm-agent?arch=x86_64&distro=amazonlinux-2 | < 3.2.1377.0-1.amzn2 |
pkg:rpm/amazonlinux/amazon-ssm-agent?arch=aarch64&distro=amazonlinux-2 | < 3.2.1377.0-1.amzn2 |
pkg:rpm/amazonlinux/amazon-ssm-agent-debuginfo?arch=x86_64&distro=amazonlinux-2 | < 3.2.1377.0-1.amzn2 |
pkg:rpm/amazonlinux/amazon-ssm-agent-debuginfo?arch=aarch64&distro=amazonlinux-2 | < 3.2.1377.0-1.amzn2 |
- ID
- ALAS2-2023-2238
- Severity
- important
- URL
- https://alas.aws.amazon.com/AL2/ALAS-2023-2238.html
- Published
-
2023-08-31T22:30:00
(12 months ago) - Modified
-
2023-09-07T18:49:00
(12 months ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- ALAS-2022-1635
- ALAS-2023-1731
- ALAS-2023-1825
- ALAS-2023-1849
- ALAS-2023-1866
- ALAS-2023-1881
- ALAS2-2022-1846
- ALAS2-2022-1847
- ALAS2-2022-1851
- ALAS2-2022-1858
- ALAS2-2022-1859
- ALAS2-2022-1860
- ALAS2-2022-1861
- ALAS2-2022-1862
- ALAS2-2022-1863
- ALAS2-2022-1864
- ALAS2-2022-1865
- ALAS2-2023-2015
- ALAS2-2023-2143
- ALAS2-2023-2192
- ALAS2-2023-2193
- ALAS2-2023-2194
- ALAS2-2023-2303
- ALPINE:CVE-2022-27191
- ALPINE:CVE-2022-27664
- ALPINE:CVE-2022-41723
- ALSA-2022:7129
- ALSA-2022:7469
- ALSA-2022:7954
- ALSA-2022:8008
- ALSA-2023:2167
- ALSA-2023:2177
- ALSA-2023:2193
- ALSA-2023:2204
- ALSA-2023:2236
- ALSA-2023:2357
- ALSA-2023:2758
- ALSA-2023:2780
- ALSA-2023:2784
- ALSA-2023:2785
- ALSA-2023:2802
- ALSA-2023:6346
- ALSA-2023:6363
- ALSA-2023:6402
- ALSA-2023:6473
- ALSA-2023:6474
- ALSA-2023:6938
- ALSA-2023:6939
- ALSA-2024:0121
- ELSA-2022-24267
- ELSA-2022-7129
- ELSA-2022-7457
- ELSA-2022-7469
- ELSA-2022-7954
- ELSA-2022-8008
- ELSA-2023-18908
- ELSA-2023-2167
- ELSA-2023-2177
- ELSA-2023-2204
- ELSA-2023-2357
- ELSA-2023-2758
- ELSA-2023-2780
- ELSA-2023-2784
- ELSA-2023-2785
- ELSA-2023-2802
- ELSA-2023-6363
- ELSA-2023-6402
- ELSA-2023-6473
- ELSA-2023-6474
- ELSA-2023-6938
- ELSA-2023-6939
- ELSA-2024-0121
- FEDORA-2022-08ae2dd481
- FEDORA-2022-13ad572b5a
- FEDORA-2022-14712f9699
- FEDORA-2022-30c5ed5625
- FEDORA-2022-3969b64d4b
- FEDORA-2022-3a63897745
- FEDORA-2022-3e1ade35db
- FEDORA-2022-45097317b4
- FEDORA-2022-4a48180f3f
- FEDORA-2022-4b5537c44c
- FEDORA-2022-5038c3236c
- FEDORA-2022-53e0f427dd
- FEDORA-2022-5cbd6de569
- FEDORA-2022-5e637f6cc6
- FEDORA-2022-5ef0bd9a27
- FEDORA-2022-6716cd0da2
- FEDORA-2022-67ec8c61d0
- FEDORA-2022-739c7a0058
- FEDORA-2022-741325e9a0
- FEDORA-2022-8bf5635efc
- FEDORA-2022-9986fbb3d7
- FEDORA-2022-9a9a638d09
- FEDORA-2022-a4c9009f3e
- FEDORA-2022-b0bd0219ff
- FEDORA-2022-ba365d3703
- FEDORA-2022-c87047f163
- FEDORA-2022-d37fb34309
- FEDORA-2022-e674d52438
- FEDORA-2022-ea8f4e232d
- FEDORA-2022-fae3ecee19
- FEDORA-2023-28c182b657
- FEDORA-2023-327346caa5
- FEDORA-2023-3737bc1c0a
- FEDORA-2023-8c02aee138
- FEDORA-2023-a5a5542890
- FEDORA-2023-abb47e24d8
- FEDORA-2023-ca444fdecf
- FEDORA-2023-cb20f08a4e
- FEDORA-2023-ccaf5538dd
- FEDORA-2023-e359fd31d2
- FEDORA-2023-e8c27ba884
- FEDORA-2024-80e062d21a
- FEDORA-2024-9cc0e0c63e
- FEDORA-2024-d652859efb
- FREEBSD:3D73E384-AD1F-11ED-983C-83FE35862E3A
- FREEBSD:6FEA7103-2EA4-11ED-B403-3DAE8AC60D3E
- GLSA-202209-26
- GLSA-202311-09
- GO-2021-0356
- GO-2022-0968
- GO-2022-0969
- GO-2023-1571
- MS:CVE-2022-27664
- MS:CVE-2022-41723
- openSUSE-SU-2022:0040-1
- openSUSE-SU-2022:0526-1
- RHBA-2023:2181
- RHSA-2022:7129
- RHSA-2022:7457
- RHSA-2022:7469
- RHSA-2022:7954
- RHSA-2022:8008
- RHSA-2023:0328
- RHSA-2023:0446
- RHSA-2023:2167
- RHSA-2023:2177
- RHSA-2023:2193
- RHSA-2023:2204
- RHSA-2023:2236
- RHSA-2023:2357
- RHSA-2023:2758
- RHSA-2023:2780
- RHSA-2023:2784
- RHSA-2023:2785
- RHSA-2023:2802
- RHSA-2023:3083
- RHSA-2023:6346
- RHSA-2023:6363
- RHSA-2023:6402
- RHSA-2023:6473
- RHSA-2023:6474
- RHSA-2023:6938
- RHSA-2023:6939
- RHSA-2023:7058
- RHSA-2024:0121
- RLSA-2022:7129
- RLSA-2022:7457
- RLSA-2022:7469
- SUSE-SU-2022:0040-1
- SUSE-SU-2022:0130-1
- SUSE-SU-2022:0526-1
- SUSE-SU-2022:1507-1
- SUSE-SU-2022:1689-1
- SUSE-SU-2022:2834-1
- SUSE-SU-2022:2839-1
- SUSE-SU-2022:2839-2
- SUSE-SU-2022:3325-1
- SUSE-SU-2022:3326-1
- SUSE-SU-2022:4409-1
- SUSE-SU-2022:4463-1
- SUSE-SU-2023:0733-1
- SUSE-SU-2023:0735-1
- SUSE-SU-2023:0811-1
- SUSE-SU-2023:0812-1
- SUSE-SU-2023:0821-1
- SUSE-SU-2023:0869-1
- SUSE-SU-2023:0871-1
- SUSE-SU-2023:2183-1
- SUSE-SU-2023:2185-1
- SUSE-SU-2023:2187-1
- SUSE-SU-2023:2312-1
- SUSE-SU-2023:2575-1
- SUSE-SU-2023:2578-1
- SUSE-SU-2023:2579-1
- SUSE-SU-2023:2598-1
- SUSE-SU-2023:3867-1
- SUSE-SU-2023:3868-1
- SUSE-SU-2023:3875-1
- SUSE-SU-2023:4124-1
- SUSE-SU-2024:0191-1
- SUSE-SU-2024:0196-1
- SUSE-SU-2024:3288-1
- USN-6038-1
- USN-6038-2
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-43565 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43565 | |
CVE | CVE-2022-27191 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27191 | |
CVE | CVE-2022-27664 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664 | |
CVE | CVE-2022-41723 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41723 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/amazon-ssm-agent?arch=x86_64&distro=amazonlinux-2 | amazonlinux | amazon-ssm-agent | < 3.2.1377.0-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/amazon-ssm-agent?arch=aarch64&distro=amazonlinux-2 | amazonlinux | amazon-ssm-agent | < 3.2.1377.0-1.amzn2 | amazonlinux-2 | aarch64 | |
Affected | pkg:rpm/amazonlinux/amazon-ssm-agent-debuginfo?arch=x86_64&distro=amazonlinux-2 | amazonlinux | amazon-ssm-agent-debuginfo | < 3.2.1377.0-1.amzn2 | amazonlinux-2 | x86_64 | |
Affected | pkg:rpm/amazonlinux/amazon-ssm-agent-debuginfo?arch=aarch64&distro=amazonlinux-2 | amazonlinux | amazon-ssm-agent-debuginfo | < 3.2.1377.0-1.amzn2 | amazonlinux-2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |