QID 356919

Date Published: 2024-01-16

QID 356919: Amazon Linux Security Advisory for kernel-livepatch : ALAS2023LIVEPATCH-2023-026

an integer overflow in kmalloc_reserve() in the linux kernel may allow a local user to crash the system, or in some cases obtain code execution in kernel space. (
( CVE-2023-42752) an issue was discovered in drivers/net/ethernet/intel/igb/igb_main.c in the igb driver in the linux kernel before 6.5.3.
A buffer size may not be adequate for frames larger than the mtu. (
( CVE-2023-45871) a use-after-free vulnerability in the linux kernels net/sched: sch_hfsc (hfsc qdisc traffic control) component can be exploited to achieve local privilege escalation. if a class with a link-sharing curve (i.e. with the hfsc_fsc flag set) has a parent without a link-sharing curve, then init_vf() will call vttree_insert() on the parent, but vttree_remove() will be skipped in update_vf().
This leaves a dangling pointer that can cause a use-after-free. we recommend upgrading past commit b3d26c5702c7d6c45456326e56d2ccf3f103e60f. (
( CVE-2023-4623) a use-after-free vulnerability in the linux kernels net/sched: sch_qfq component can be exploited to achieve local privilege escalation. when the plug qdisc is used as a class of the qfq qdisc, sending network packets triggers use-after-free in qfq_dequeue() due to the incorrect .peek handler of sch_plug and lack of error checking in agg_dequeue(). we recommend upgrading past commit 8fc134fee27f2263988ae38920bc03da416b03d8. (
( CVE-2023-5717)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2023LIVEPATCH-2023-026 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2023LIVEPATCH-2023-026 amazon linux 2023 URL Logo alas.aws.amazon.com/AL2023/ALASLIVEPATCH-2023-026.html