[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2023-1706 --- kernel

ID: oval:org.secpod.oval:def:1601665Date: (C)2023-03-27   (M)2024-05-22
Class: PATCHFamily: unix




Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco and Broadcom NetXtrem II BCM5780 though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior. A NULL pointer dereference flaw was found in rawv6_push_pending_frames in net/ipv6/raw.c in the network subcomponent in the Linux kernel. This flaw causes the system to crash

Platform:
Amazon Linux AMI
Product:
kernel
perf
Reference:
ALAS-2023-1706
CVE-2022-3643
CVE-2023-0459
CVE-2023-0045
CVE-2022-42329
CVE-2022-42328
CVE-2023-0394
CVE-2023-0461
CVE-2023-1073
CVE    8
CVE-2023-0459
CVE-2023-1073
CVE-2023-0461
CVE-2023-0394
...

© SecPod Technologies