QID 356588

Date Published: 2023-11-09

QID 356588: Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2023-154

a use-after-free vulnerability in the linux kernels net/sched: cls_route component can be exploited to achieve local privilege escalation. when route4_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter.
This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. we recommend upgrading past commit b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8. (
( CVE-2023-4206) a use-after-free vulnerability in the linux kernels net/sched: cls_fw component can be exploited to achieve local privilege escalation. when fw_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter.
This causes a problem when updating a filter bound to a class, as tcf_unbind_filter() is always called on the old instance in the success path, decreasing filter_cnt of the still referenced class and allowing it to be deleted, leading to a use-after-free. we recommend upgrading past commit 76e42ae831991c828cffa8c37736ebfb831ad5ec. (
( CVE-2023-4207) a use-after-free vulnerability in the linux kernels net/sched: cls_u32 component can be exploited to achieve local privilege escalation. when u32_change() is called on an existing filter, the whole tcf_result struct is always copied into the new instance of the filter.
This leaves a dangling pointer that can cause a use-after-free. we recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. (
( CVE-2023-4921)


Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2LIVEPATCH-2023-154 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2LIVEPATCH-2023-154 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASLIVEPATCH-2023-154.html