Access of Resource Using Incompatible Type ('Type Confusion') Affecting kernel package, versions <0:4.14.344-262.563.amzn2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-AMZN2-KERNEL-7447660
- published 13 Jul 2024
- disclosed 27 Mar 2023
Introduced: 27 Mar 2023
CVE-2023-1077 Open this link in a new tabHow to fix?
Upgrade Amazon-Linux:2
kernel
to version 0:4.14.344-262.563.amzn2 or higher.
This issue was patched in ALAS2-2024-2588
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by Amazon-Linux
.
See How to fix?
for Amazon-Linux:2
relevant fixed versions and status.
In the Linux kernel, pick_next_rt_entity() may return a type confused entry, not detected by the BUG_ON condition, as the confused entry will not be NULL, but list_head.The buggy error condition would lead to a type confused entry with the list head,which would then be used as a type confused sched_rt_entity,causing memory corruption.
References
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077
- https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
- https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
- https://security.netapp.com/advisory/ntap-20230511-0002/
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html