QID 356584

Date Published: 2023-11-09

QID 356584: Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-152

a use-after-free vulnerability in the linux kernels net/sched: cls_fw component can be exploited to achieve local privilege escalation. when fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter.
This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. we recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec. (
( CVE-2023-4207) a use-after-free vulnerability in the linux kernels af_unix component can be exploited to achieve local privilege escalation. the unix_stream_sendpage() function tries to add data to the last skb in the peers recv queue without locking the queue.
Thus there is a race where unix_stream_sendpage() could access an skb locklessly that is being released by garbage collection, resulting in use-after-free. we recommend upgrading past commit 790c2f9d15b594350ae9bca7b236f2b1859de02c. (
( CVE-2023-4622) a use-after-free vulnerability in the linux kernels net/sched: sch_hfsc (hfsc qdisc traffic control) component can be exploited to achieve local privilege escalation. if a class with a link-sharing curve (i.e. with the hfsc_fsc flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf().
This leaves a dangling pointer that can cause a use-after-free. we recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. (
( CVE-2023-4921)


Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2023-152 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356584

    Software Advisories
    Advisory ID Software Component Link
    ALAS2LIVEPATCH-2023-152 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-152.html