QID 357358
Date Published: 2024-04-02
QID 357358: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2024-052
A flaw was found in the smb client in the linux kernel.
A potential out-of-bounds error was seen in the smb2_parse_contexts() function.
Validate offsets and lengths before dereferencing create contexts in smb2_parse_contexts(). (
( CVE-2023-52434) a vulnerability was discovered in the linux kernel's ipv4 networking stack.
Under certain conditions, mptcp and netlabel can be configured in a way that triggers a double free memory error in net/ipv4/af_inet.c:inet_sock_destruct().
This may lead to a system crash, denial of service, or potential arbitrary code execution. (
( CVE-2024-1627) in the linux kernel, the following vulnerability has been resolved: ext4: regenerate buddy after block freeing failed if under fc replay this mostly reverts commit 6bd97bf273bd ("ext4: remove redundant mb_regenerate_buddy()") and reintroduces mb_regenerate_buddy().
Based on code in mb_free_blocks(), fast commit replay can end up marking as free blocks that are already marked as such.
This causes corruption of the buddy bitmap so we need to regenerate it in that case. (
( CVE-2024-26601)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2KERNEL-5.10-2024-052 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2024-052.html
CVEs related to QID 357358
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.10-2024-052 | amazon linux 2 |
|