QID 357055
Date Published: 2024-01-25
QID 357055: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2024-047
a race condition leading to a use-after-free issue was found in the qxl driver in the linux kernel. (
( CVE-2023-39198) an issue was discovered in the linux kernel through 6.5.9.
During a race with sq thread exit, an io_uring/fdinfo.c io_uring_show_fdinfo null pointer dereference can occur. (
( CVE-2023-46862) an out-of-bounds read vulnerability was found in the nvme-of/tcp subsystem in the linux kernel.
This flaw allows a remote attacker to send a crafted tcp packet, triggering a heap-based buffer overflow that results in kmalloc data to be printed (and potentially leaked) to the kernel ring buffer (dmesg). (
( CVE-2023-6121) a use-after-free vulnerability in the linux kernels netfilter: nf_tables component can be exploited to achieve local privilege escalation. the function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of pipapo (pile packet policies) elements, leading to use-after-free. we recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a. (
( CVE-2023-6817) a heap out-of-bounds write vulnerability in the linux kernels performance events system component can be exploited to achieve local privilege escalation. a perf_events read_size can overflow, leading to an heap out-of-bounds increment or write in perf_read_group(). we recommend upgrading past commit 382c27f4ed28f803b1f1473ac2d8db0afc795a1b. (
( CVE-2023-6932)
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2KERNEL-5.10-2024-047 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-047.html
CVEs related to QID 357055
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.10-2024-047 | amazon linux 2 |
|