QID 356567
Date Published: 2023-11-09
QID 356567: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2023-027
2023-10-31:( CVE-2023-45871 was added to this advisory. 2023-10-12:( CVE-2023-39192 was added to this advisory. 2023-10-12:( CVE-2023-39193 was added to this advisory. netfilter: xt_u32: validate user space input note: https://www.zerodayinitiative.com/advisories/zdi-23-1490/ note: https://git.kernel.org/linus/69c5d284f67089b4750d28ff6ac6f52ec224b330 (6.6-rc1) (cve-2023-39192) netfilter: xt_sctp: validate the flag_info count note: https://www.zerodayinitiative.com/advisories/zdi-23-1491/ note: https://git.kernel.org/linus/e99476497687ef9e850748fe6d232264f30bc8f9 (6.6-rc1) (cve-2023-39193) an issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the igb driver in the linux kernel before 6.5.3.
A buffer size may not be adequate for frames larger than the mtu. (
( CVE-2023-45871) a use-after-free vulnerability in the linux kernels net/sched: sch_hfsc (hfsc qdisc traffic control) component can be exploited to achieve local privilege escalation. if a class with a link-sharing curve (i.e. with the hfsc_fsc flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf().
This leaves a dangling pointer that can cause a use-after-free. we recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. (
( CVE-2023-4921)
Note: The preceding description block is extracted directly from the security advisory.Using automation, we have attempted to clean and format it as much as possible without introducing additional.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2KERNEL-5.15-2023-027 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2023-027.html
CVEs related to QID 356567
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.15-2023-027 | amazon linux 2 |
|