QID 357311
Date Published: 2024-03-07
QID 357311: Amazon Linux Security Advisory for kernel-livepatch : ALAS2LIVEPATCH-2024-166
An out-of-bounds access vulnerability involving netfilter was reported and fixed as: f1082dd31fe4 (netfilter: nf_tables: reject tables of unsupported family); while creating a new netfilter table, lack of a safeguard against invalid nf_tables family (pf) values within `nf_tables_newtable` function enables an attacker to achieve out-of-bounds access. (
( CVE-2023-6040) an out-of-bounds memory read flaw was found in receive_encrypted_standard in fs/smb/client/smb2ops.c in the smb client sub-component in the linux kernel.
This issue occurs due to integer underflow on the memcpy length, leading to a denial of service. (
( CVE-2024-0565) an out-of-bounds memory write flaw was found in the linux kernel's transport layer security functionality in how a user calls a function splice with a ktls socket as the destination.
This flaw allows a local user to crash or potentially escalate their privileges on the system. (
( CVE-2024-0646) in rds_recv_track_latency in net/rds/af_rds.c in the linux kernel through 6.7.1, there is an off-by-one error for an rds_msg_rx_dgram_trace_max comparison, resulting in out-of-bounds access. (
( CVE-2024-23849)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2LIVEPATCH-2024-166 -
alas.aws.amazon.com/AL2/ALASLIVEPATCH-2024-166.html
CVEs related to QID 357311
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2LIVEPATCH-2024-166 | amazon linux 2 |
|