QID 354878

Date Published: 2023-04-06

QID 354878: Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-116

The upstream bug report describes this issue as follows: a flaw found in the linux kernel in rds (reliable datagram sockets) protocol.
The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion.
Local user can trigger this with rds_message_put().
Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user.
It is known how to trigger this, which causes an oob access, and a lock corruption. (
( CVE-2023-1078) in the linux kernel before 6.1.13, there is a double free in net/mpls/af_mpls.c upon an allocation failure (for registering the sysctl table under a new location) during the renaming of a device. (
( CVE-2023-26545)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2023-116 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354878

    Software Advisories
    Advisory ID Software Component Link
    ALAS2LIVEPATCH-2023-116 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-116.html