ALAS2023-2026-1662


Amazon Linux 2023 Security Advisory: ALAS2023-2026-1662
Advisory Released Date: 2026-05-15
Advisory Updated Date: 2026-05-15
Severity: Important

Issue Overview:

A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution. (CVE-2025-15467)

Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. (CVE-2025-69419)

A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. (CVE-2025-69420)

Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. (CVE-2025-69421)


Affected Packages:

aws-cfn-bootstrap


Issue Correction:
Run dnf update aws-cfn-bootstrap --releasever 2023.11.20260514 or dnf update --advisory ALAS2023-2026-1662 --releasever 2023.11.20260514 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation

New Packages:
noarch:
    aws-cfn-bootstrap-2.0-39.amzn2023.noarch

src:
    aws-cfn-bootstrap-2.0-39.amzn2023.src