QID 356469
Date Published: 2023-11-08
QID 356469: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2023-041
A flaw was found in rsvp_change().
The root cause is an slab-out-of-bound access, but since the offset to the original pointer is an `unsign int` fully controlled by users, the behavior is usually a wild pointer access. (
( CVE-2023-42755) a use-after-free vulnerability in the linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. we recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325. (
( CVE-2023-5197)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
Solution
Please refer to Amazon advisory: ALAS2KERNEL-5.10-2023-041 for affected packages and patching details, or update with your package manager.
Vendor References
- ALAS2KERNEL-5.10-2023-041 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-041.html
CVEs related to QID 356469
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.10-2023-041 | amazon linux 2 |
|