QID 356572
Date Published: 2023-11-09
QID 356572: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2023-040
2023-10-31:( CVE-2023-45871 was added to this advisory. 2023-10-12:( CVE-2023-39192 was added to this advisory. 2023-10-12:( CVE-2023-39193 was added to this advisory. netfilter: xt_u32: validate user space input note: https://www.zerodayinitiative.com/advisories/zdi-23-1490/ note: https://git.kernel.org/linus/69c5d284f67089b4750d28ff6ac6f52ec224b330 (6.6-rc1) (cve-2023-39192) netfilter: xt_sctp: validate the flag_info count note: https://www.zerodayinitiative.com/advisories/zdi-23-1491/ note: https://git.kernel.org/linus/e99476497687ef9e850748fe6d232264f30bc8f9 (6.6-rc1) (cve-2023-39193) the upstream commit describes this issue as follows: the missing ip_set_hash_with_net0 macro in ip_set_hash_netportnet can lead to the use of wrong `cidr_pos(c)` for calculating array offsets, which can lead to integer underflow.
As a result, it leads to slab out-of-bound access. (
( CVE-2023-42753) an issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the igb driver in the linux kernel before 6.5.3.
A buffer size may not be adequate for frames larger than the mtu. (
( CVE-2023-45871) a use-after-free vulnerability in the linux kernels net/sched: sch_hfsc (hfsc qdisc traffic control) component can be exploited to achieve local privilege escalation. if a class with a link-sharing curve (i.e. with the hfsc_fsc flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf().
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2KERNEL-5.10-2023-040 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2023-040.html
CVEs related to QID 356572
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.10-2023-040 | amazon linux 2 |
|