Amazon Linux 2023 Security Advisory: ALAS2023-2026-1662
Advisory Released Date: 2026-05-15
Advisory Updated Date: 2026-05-15
FAQs regarding Amazon Linux ALAS/CVE Severity
A flaw was found in OpenSSL. A remote attacker can exploit a stack buffer overflow vulnerability by supplying a crafted Cryptographic Message Syntax (CMS) message with an oversized Initialization Vector (IV) when parsing AuthEnvelopedData structures that use Authenticated Encryption with Associated Data (AEAD) ciphers such as AES-GCM. This can lead to a crash, causing a Denial of Service (DoS), or potentially allow for remote code execution. (CVE-2025-15467)
Calling PKCS12_get_friendlyname() function on a maliciously crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing non-ASCII BMP code point can trigger a one byte write before the allocated buffer. (CVE-2025-69419)
A type confusion vulnerability exists in the TimeStamp Response verification code where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing a malformed TimeStamp Response file. (CVE-2025-69420)
Processing a malformed PKCS#12 file can trigger a NULL pointer dereference in the PKCS12_item_decrypt_d2i_ex() function. (CVE-2025-69421)
Affected Packages:
aws-cfn-bootstrap
Issue Correction:
Run dnf update aws-cfn-bootstrap --releasever 2023.11.20260514 or dnf update --advisory ALAS2023-2026-1662 --releasever 2023.11.20260514 to update your system.
More information on how to update your system can be found on this page: Amazon Linux 2023 documentation
noarch:
aws-cfn-bootstrap-2.0-39.amzn2023.noarch
src:
aws-cfn-bootstrap-2.0-39.amzn2023.src